var-201306-0006
Vulnerability from variot
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world's leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei's mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. Successful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. The following are vulnerable: Huawei Quidway series Huawei CX600 V600R001 Huawei CX600 V600R003C00SPC900 Huawei ME60 V600R002C07 and prior versions AR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products ===========================================
[ADVISORY INFORMATION] Title: Weak password encryption on Huawei products Release date: 13/11/2012 Credits: Roberto Paleari, Emaze Networks (roberto.paleari@emaze.net) Ivan Speziale, Emaze Networks (ivan.speziale@emaze.net)
[VULNERABILITY INFORMATION] Class: Information disclosure
[AFFECTED PRODUCTS] We confirm the presence of this security vulnerability on the following products: * Huawei Quidway series * Huawei CX600
Other models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a victim's device can be deciphered instantaneously.
A Python procedure that decodes a given password is included below. Upon termination, procedure decrypt_password() returns the clear-text password.
def decode_char(c): if c == 'a': r = '?' else: r = c return ord(r) - ord('!')
def ascii_to_binary(s): assert len(s) == 24
out = [0]*18
i = 0
j = 0
for i in range(0, len(s), 4):
y = decode_char(s[i + 0])
y = (y << 6) & 0xffffff
k = decode_char(s[i + 1])
y = (y | k) & 0xffffff
y = (y << 6) & 0xffffff
k = decode_char(s[i + 2])
y = (y | k) & 0xffffff
y = (y << 6) & 0xffffff
k = decode_char(s[i + 3])
y = (y | k) & 0xffffff
out[j+2] = chr(y & 0xff)
out[j+1] = chr((y>>8) & 0xff)
out[j+0] = chr((y>>16) & 0xff)
j += 3
return "".join(out)
def decrypt_password(p): r = ascii_to_binary(p)
r = r[:16]
d = DES.new("\x01\x02\x03\x04\x05\x06\x07\x08", DES.MODE_ECB)
r = d.decrypt(r)
return r.rstrip("\x00")
[REMEDIATION] We recommend to store passwords using a proper hashing algorithm, instead of leveraging symmetric encryption. Further details are available at the following URL: http://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141
[COPYRIGHT] Copyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. Permission is hereby granted to redistribute this advisory, providing that no changes are made and that the copyright notices and disclaimers remain intact.
[DISCLAIMER] Emaze Networks S.p.A is not responsible for the misuse of the information provided in our security advisories. These advisories are a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0006", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "acu", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003c01spc100" }, { "model": "acu", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "acu", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00spc100" }, { "model": "ar g3", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "ar g3", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c01" }, { "model": "ar g3", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r002c00spc200" }, { "model": "atn", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "atn", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c01" }, { "model": "cx200", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "cx300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "cx600", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r002" }, { "model": "cx600", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r001" }, { "model": "cx600", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r002" }, { "model": "cx600", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r003" }, { "model": "e200e-b", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v100r005c01" }, { "model": "e200e-c", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "e200e-x1", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v100r005c01" }, { "model": "e200e-x2", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v100r005c01" }, { "model": "eudemon1000", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r006c02" }, { "model": "eudemon1000e-u", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "eudemon1000e-x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r002" }, { "model": "eudemon100e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r007" }, { "model": "eudemon200", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "eudemon300", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r006c02" }, { "model": "eudemon500", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r006c02" }, { "model": "eudemon8000e-x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00spc600" }, { "model": "ma5200g", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r003" }, { "model": "ma5200g", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v300r003" }, { "model": "me60", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "me60", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "me60", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r002" }, { "model": "me60", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r003" }, { "model": "me60", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r005c00spc600" }, { "model": "ne20", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r005" }, { "model": "ne40", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v300r005" }, { "model": "ne40e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r001" }, { "model": "ne5000e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v300r007" }, { "model": "ne5000e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v800r002" }, { "model": "ne80", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v300r005" }, { "model": "ne80e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r001" }, { "model": "ne80e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r002" }, { "model": "ne80e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r003" }, { "model": "nip100", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001" }, { "model": "nip1000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001" }, { "model": "nip200", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001" }, { "model": "nip2100", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001c00" }, { "model": "nip2200", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001c00" }, { "model": "nip5100", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001c00" }, { "model": "s2300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r002" }, { "model": "s2300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003" }, { "model": "s2300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "s2300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s2700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s3300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r002" }, { "model": "s3300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003" }, { "model": "s3300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "s3300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s3300hi", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s3300hi", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s3700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "s3700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s3700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s5300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r002" }, { "model": "s5300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003" }, { "model": "s5300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "s5300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s5300hi", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s5300hi", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s5306", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s5306", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s6300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s6300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s6700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s6700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s7700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003" }, { "model": "s7700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s9300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001" }, { "model": "s9300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r002" }, { "model": "s9300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003" }, { "model": "s9300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "svn2000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "svn3000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r002c02spc802b041" }, { "model": "svn5000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "svn5300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001c01b019" }, { "model": "wlan ac 6605", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "wlan ac 6605", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00spc100" }, { "model": "cx600", "scope": null, "trust": 1.2, "vendor": "huawei", "version": null }, { "model": "eudemon 8160e", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v100r003c00" }, { "model": "eudemon usg5500", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r002" }, { "model": "e200x3", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "h3c ar\\", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "r2209" }, { "model": "ar 19\\/29\\/49", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "r2207" }, { "model": "e200x7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "e200 usg2200", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "eudemon usg9500", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc600" }, { "model": "e200 usg5100", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "eudemon usg5300", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r001" }, { "model": "ne40e\\/80e", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v600r002" }, { "model": "eudemon 8080e", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v100r003c00" }, { "model": "e200e-usg2100", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v100r005c01" }, { "model": "ne40e\\/80e", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v600r003" }, { "model": "e200x5", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "ne40e", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v300r005" }, { "model": "ne20e-x6", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v300r005" }, { "model": "eudemon usg9300", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v100r003c00" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar 19/29/49", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "r2207" }, { "model": "e200e-x3", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "e200e-x5", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "e200e-x7", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "e200e/usg2100", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v100r005c01" }, { "model": "e200e/usg2200", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "e200e/usg5100", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "eudemon8080e", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v100r003c00" }, { "model": "eudemon8160e", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v100r003c00" }, { "model": "eudemonusg5300", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r001" }, { "model": "eudemonusg5500", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r002" }, { "model": "eudemonusg9300", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v100r003c00" }, { "model": "eudemonusg9500", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00spc600" }, { "model": "h3c ar", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "ar x9 series r2209" }, { "model": "ne20e-x6", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v600r003" }, { "model": "ne40e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v300r003" }, { "model": "ne40e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v600r002" }, { "model": "ne40e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v600r003" }, { "model": "ne40e/80e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v300r003" }, { "model": "ne40e/80e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v600r001" }, { "model": "ne40e/80e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v600r002" }, { "model": "ne40e/80e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v600r003" }, { "model": "ne80e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v300r003" }, { "model": "s2700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v100r005" }, { "model": "ne5000e v300r007", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ne5000e v800r002", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ma5200g v200r003", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ma5200g v300r003", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ne40e/80e", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "atn v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "atn v200r001c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ne40/ne80 v300r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ne20e-x6 v600r003", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ne20 v200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "me60", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "cx200/cx300 v100r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "acu v100r003c01spc100", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "acu v200r001c00spc100", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "acu v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "wlan ac v200r001c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "6605" }, { "model": "wlan ac v200r001c00spc100", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "6605" }, { "model": "s9300", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300/s3300/s5300", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300/s3300/s5300/s2700/s3 v100r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300/s3300/s5300/s3300hi/ v100r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3300hi/s5300hi/s5306/s630 v200r001", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar g3 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar g3 v200r001c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar g3 v200r002c00spc200", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "h3c ar ar series r2209", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=x9" }, { "model": "ar r2207", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "19/29/49\u003c=" }, { "model": "eudemon100e v200r007", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "eudemon200 v200r001", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "eudemon300\u0026500\u00261000 v200r006c02", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "eudemon1000e-u/usg5300 v200r001", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "eudemon1000e-x/usg5500 v200r002", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "eudemon8080e\u00268160e/usg9300 v100r003c00", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "eudemon8000e-x/usg9500 v200r001c00spc600", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "e200e-c\u0026x3\u0026x5\u0026x7/usg2200\u00265100 v200r003c00", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "e200e-b\u0026x1\u0026x2/usg2100 v100r005c01", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "svn5300 v100r001c01b019", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "svn2000\u00265000 series v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "svn3000 v100r002c02spc802b041", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "nip100/200/1000 v100r001", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "nip2100\u00262200\u00265100 v100r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "quidway series", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "quidway series", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "me60 v600r002c07", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "cx600 v600r003c00spc900", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "cx600 v600r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar r2207", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "19/29/49" }, { "model": "me60 v600r005c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "cx600 v600r005c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "cx600 v600r003c00spca00", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar r2209", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "19/29/49" } ], "sources": [ { "db": "CERT/CC", "id": "VU#948096" }, { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "BID", "id": "56510" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "NVD", "id": "CVE-2012-4960" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r002", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2209", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r006c02", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2207", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r006c02", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r006c02", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001c00spc600", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001c00spc600", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r002", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-4960" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Roberto Paleari and Ivan Speziale from Emaze Networks", "sources": [ { "db": "BID", "id": "56510" }, { "db": "CNNVD", "id": "CNNVD-201211-280" } ], "trust": 0.9 }, "cve": "CVE-2012-4960", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "availabilityRequirement": "NOT DEFINED", "baseScore": 6.5, "collateralDamagePotential": "LOW-MEDIUM", "confidentialityImpact": "PARTIAL", "confidentialityRequirement": "NOT DEFINED", "enviromentalScore": 5.1, "exploitability": "FUNCTIONAL", "exploitabilityScore": 8.0, "id": "CVE-2012-4960", "impactScore": 6.4, "integrityImpact": "PARTIAL", "integrityRequirement": "NOT DEFINED", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "remediationLevel": "OFFICIAL FIX", "reportConfidence": "CONFIRMED", "severity": "MEDIUM", "targetDistribution": "MEDIUM", "trust": 0.8, "userInterationRequired": null, "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2012-4960", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CNVD-2013-08074", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-58241", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-4960", "trust": 2.6, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2013-08074", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201306-403", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-58241", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#948096" }, { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "VULHUB", "id": "VHN-58241" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "NVD", "id": "CVE-2012-4960" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world\u0027s leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei\u0027s mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. \nSuccessful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. \nThe following are vulnerable:\nHuawei Quidway series\nHuawei CX600 V600R001\nHuawei CX600 V600R003C00SPC900\nHuawei ME60 V600R002C07 and prior versions\nAR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products\n===========================================\n\n[ADVISORY INFORMATION]\nTitle:\t\tWeak password encryption on Huawei products\nRelease date: 13/11/2012\nCredits: \tRoberto Paleari, Emaze Networks (roberto.paleari@emaze.net)\n\t\tIvan Speziale, Emaze Networks (ivan.speziale@emaze.net)\n\n[VULNERABILITY INFORMATION]\nClass: \t Information disclosure\n\n[AFFECTED PRODUCTS]\nWe confirm the presence of this security vulnerability on the following\nproducts:\n * Huawei Quidway series\n * Huawei CX600\n\nOther models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a\nvictim\u0027s device can be deciphered instantaneously. \n\nA Python procedure that decodes a given password is included below. Upon\ntermination, procedure decrypt_password() returns the clear-text password. \n\n\u003ccut\u003e\nfrom Crypto.Cipher import DES\n\ndef decode_char(c):\n if c == \u0027a\u0027:\n r = \u0027?\u0027\n else:\n r = c\n return ord(r) - ord(\u0027!\u0027)\n\ndef ascii_to_binary(s):\n assert len(s) == 24\n\n out = [0]*18\n i = 0\n j = 0\n\n for i in range(0, len(s), 4):\n y = decode_char(s[i + 0])\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 1])\n y = (y | k) \u0026 0xffffff\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 2])\n y = (y | k) \u0026 0xffffff\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 3])\n y = (y | k) \u0026 0xffffff\n\n out[j+2] = chr(y \u0026 0xff)\n out[j+1] = chr((y\u003e\u003e8) \u0026 0xff)\n out[j+0] = chr((y\u003e\u003e16) \u0026 0xff)\n\n j += 3\n\n return \"\".join(out)\n\ndef decrypt_password(p):\n r = ascii_to_binary(p)\n\n r = r[:16]\n\n d = DES.new(\"\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\", DES.MODE_ECB)\n r = d.decrypt(r)\n\n return r.rstrip(\"\\x00\")\n\u003c/cut\u003e\n\n\n[REMEDIATION] \nWe recommend to store passwords using a proper hashing algorithm, instead of\nleveraging symmetric encryption. Further details are available at the following URL:\nhttp://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141\n\n[COPYRIGHT]\nCopyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. \nPermission is hereby granted to redistribute this advisory, providing that no\nchanges are made and that the copyright notices and disclaimers remain intact. \n\n[DISCLAIMER]\nEmaze Networks S.p.A is not responsible for the misuse of the information\nprovided in our security advisories. These advisories are a service to the\nprofessional security community. There are NO WARRANTIES with regard to this\ninformation. Any application or distribution of this information constitutes\nacceptance AS IS, at the user\u0027s own risk. This information is subject to change\nwithout notice", "sources": [ { "db": "NVD", "id": "CVE-2012-4960" }, { "db": "CERT/CC", "id": "VU#948096" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "BID", "id": "56510" }, { "db": "VULHUB", "id": "VHN-58241" }, { "db": "PACKETSTORM", "id": "118054" } ], "trust": 3.87 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-58241", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-58241" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-4960", "trust": 4.2 }, { "db": "CERT/CC", "id": "VU#948096", "trust": 2.7 }, { "db": "BID", "id": "56510", "trust": 1.6 }, { "db": "JVN", "id": "JVNVU90202792", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-006004", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "118054", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2013-08074", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2012-6517", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201211-280", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201306-403", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "38020", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-58241", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#948096" }, { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "VULHUB", "id": "VHN-58241" }, { "db": "BID", "id": "56510" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "PACKETSTORM", "id": "118054" }, { "db": "NVD", "id": "CVE-2012-4960" }, { "db": "CNNVD", "id": "CNNVD-201211-280" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "id": "VAR-201306-0006", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "VULHUB", "id": "VHN-58241" } ], "trust": 2.164663294642857 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" } ] }, "last_update_date": "2023-12-18T13:44:36.277000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20120827-01-CX600", "trust": 0.8, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" }, { "title": "Huawei multiple product encryption is not a strong vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/34800" }, { "title": "Huawei patch for multiple product password encryption vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/25088" }, { "title": "Huawei Fixing measures for vulnerabilities of encryption problems in many products", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=170984" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-58241" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "NVD", "id": "CVE-2012-4960" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" }, { "trust": 1.9, "url": "http://www.kb.cert.org/vuls/id/948096" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4960" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu90202792/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4960" }, { "trust": 0.6, "url": "http://packetstormsecurity.org/files/118054/huawei-weak-password-encryption.html" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/56510" }, { "trust": 0.4, "url": "http://support.huawei.com/enterprise/readlatestnewsaction.action?contentid=news1000001141" }, { "trust": 0.3, "url": "http://www.huawei.com/" }, { "trust": 0.3, "url": "msg://bugtraq/201211130911.qad9ba1q022014@sf01web1.securityfocus.com" } ], "sources": [ { "db": "CERT/CC", "id": "VU#948096" }, { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "VULHUB", "id": "VHN-58241" }, { "db": "BID", "id": "56510" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "PACKETSTORM", "id": "118054" }, { "db": "NVD", "id": "CVE-2012-4960" }, { "db": "CNNVD", "id": "CNNVD-201211-280" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#948096" }, { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "VULHUB", "id": "VHN-58241" }, { "db": "BID", "id": "56510" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "PACKETSTORM", "id": "118054" }, { "db": "NVD", "id": "CVE-2012-4960" }, { "db": "CNNVD", "id": "CNNVD-201211-280" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-08-05T00:00:00", "db": "CERT/CC", "id": "VU#948096" }, { "date": "2013-06-25T00:00:00", "db": "CNVD", "id": "CNVD-2013-08074" }, { "date": "2012-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2012-6517" }, { "date": "2013-06-20T00:00:00", "db": "VULHUB", "id": "VHN-58241" }, { "date": "2012-11-13T00:00:00", "db": "BID", "id": "56510" }, { "date": "2013-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "date": "2012-11-13T23:22:55", "db": "PACKETSTORM", "id": "118054" }, { "date": "2013-06-20T15:55:00.897000", "db": "NVD", "id": "CVE-2012-4960" }, { "date": "2012-11-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201211-280" }, { "date": "2013-06-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-03T00:00:00", "db": "CERT/CC", "id": "VU#948096" }, { "date": "2013-07-01T00:00:00", "db": "CNVD", "id": "CNVD-2013-08074" }, { "date": "2012-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2012-6517" }, { "date": "2013-08-22T00:00:00", "db": "VULHUB", "id": "VHN-58241" }, { "date": "2015-03-19T08:28:00", "db": "BID", "id": "56510" }, { "date": "2013-08-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "date": "2013-08-22T03:59:17.713000", "db": "NVD", "id": "CVE-2012-4960" }, { "date": "2012-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201211-280" }, { "date": "2021-11-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201211-280" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei networking equipment weak password cipher", "sources": [ { "db": "CERT/CC", "id": "VU#948096" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201211-280" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ], "trust": 1.2 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.