var-201706-0187
Vulnerability from variot
The user authentication module in Huawei Campus switches S5700, S5300, S6300, and S6700 with software before V200R001SPH012 and S7700, S9300, and S9700 with software before V200R001SPH015 allows remote attackers to cause a denial of service (device restart) via vectors involving authentication, which trigger an array access violation. Huawei Campus Series Switches are prone to a denial-of-service vulnerability. Attackers can exploit this issue to restart the affected device, denying service to legitimate users. Huawei Campus switches S5700, etc. are all switch products of China's Huawei (Huawei). The user authentication module is a module for user login authentication. The following products and versions are affected: Huawei Campus switches S5700 V200R001SPH012 Version; Campus switches S5300 V200R001SPH012 Version; Campus switches S6300 V200R001SPH012 Version; Campus switches S6700 V200R001SPH012 Version; Campus switches S7700 V200R001SPH012 Version; Campus switches S9300 V200R001SPH012 Version; Campus switches S9700 V200R001SPH012 Version
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0187", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "s6700", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s9700", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s9300", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s7700", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5700", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5300", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s6300", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph012" }, { "model": "s5700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph012" }, { "model": "s6300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph012" }, { "model": "s6700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph012" }, { "model": "s7700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph015" }, { "model": "s9300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph015" }, { "model": "s9700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph015" }, { "model": "s5300", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5700", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s6700", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s9700", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s6300", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s7700", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s9300", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v200r001c00spc300" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007609" }, { "db": "NVD", "id": "CVE-2015-2800" }, { "db": "CNNVD", "id": "CNNVD-201504-531" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001c00spc300", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:campus_s5700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001c00spc300", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:campus_s5300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001c00spc300", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:campus_s6300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001c00spc300", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:campus_s6700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001c00spc300", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:campus_s7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001c00spc300", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:campus_s9300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001c00spc300", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:campus_s9700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-2800" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "vhunter", "sources": [ { "db": "BID", "id": "73355" }, { "db": "CNNVD", "id": "CNNVD-201504-531" } ], "trust": 0.9 }, "cve": "CVE-2015-2800", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-2800", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-80761", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-2800", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-2800", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201504-531", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-80761", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-80761" }, { "db": "JVNDB", "id": "JVNDB-2015-007609" }, { "db": "NVD", "id": "CVE-2015-2800" }, { "db": "CNNVD", "id": "CNNVD-201504-531" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The user authentication module in Huawei Campus switches S5700, S5300, S6300, and S6700 with software before V200R001SPH012 and S7700, S9300, and S9700 with software before V200R001SPH015 allows remote attackers to cause a denial of service (device restart) via vectors involving authentication, which trigger an array access violation. Huawei Campus Series Switches are prone to a denial-of-service vulnerability. \nAttackers can exploit this issue to restart the affected device, denying service to legitimate users. Huawei Campus switches S5700, etc. are all switch products of China\u0027s Huawei (Huawei). The user authentication module is a module for user login authentication. The following products and versions are affected: Huawei Campus switches S5700 V200R001SPH012 Version; Campus switches S5300 V200R001SPH012 Version; Campus switches S6300 V200R001SPH012 Version; Campus switches S6700 V200R001SPH012 Version; Campus switches S7700 V200R001SPH012 Version; Campus switches S9300 V200R001SPH012 Version; Campus switches S9700 V200R001SPH012 Version", "sources": [ { "db": "NVD", "id": "CVE-2015-2800" }, { "db": "JVNDB", "id": "JVNDB-2015-007609" }, { "db": "BID", "id": "73355" }, { "db": "VULHUB", "id": "VHN-80761" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-2800", "trust": 2.8 }, { "db": "BID", "id": "73355", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2015-007609", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201504-531", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-80761", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-80761" }, { "db": "BID", "id": "73355" }, { "db": "JVNDB", "id": "JVNDB-2015-007609" }, { "db": "NVD", "id": "CVE-2015-2800" }, { "db": "CNNVD", "id": "CNNVD-201504-531" } ] }, "id": "VAR-201706-0187", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-80761" } ], "trust": 0.66499138 }, "last_update_date": "2023-12-18T13:29:17.104000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20150319-01-Campus switch", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-418554" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007609" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-80761" }, { "db": "JVNDB", "id": "JVNDB-2015-007609" }, { "db": "NVD", "id": "CVE-2015-2800" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/73355" }, { "trust": 1.7, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-418554.htm" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2800" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2800" }, { "trust": 0.3, "url": "http://www.huawei.com/" }, { "trust": 0.3, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-418554.htm" } ], "sources": [ { "db": "VULHUB", "id": "VHN-80761" }, { "db": "BID", "id": "73355" }, { "db": "JVNDB", "id": "JVNDB-2015-007609" }, { "db": "NVD", "id": "CVE-2015-2800" }, { "db": "CNNVD", "id": "CNNVD-201504-531" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-80761" }, { "db": "BID", "id": "73355" }, { "db": "JVNDB", "id": "JVNDB-2015-007609" }, { "db": "NVD", "id": "CVE-2015-2800" }, { "db": "CNNVD", "id": "CNNVD-201504-531" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-06-08T00:00:00", "db": "VULHUB", "id": "VHN-80761" }, { "date": "2015-03-19T00:00:00", "db": "BID", "id": "73355" }, { "date": "2017-07-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007609" }, { "date": "2017-06-08T16:29:00.403000", "db": "NVD", "id": "CVE-2015-2800" }, { "date": "2015-03-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201504-531" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-06-20T00:00:00", "db": "VULHUB", "id": "VHN-80761" }, { "date": "2015-05-07T17:22:00", "db": "BID", "id": "73355" }, { "date": "2017-07-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007609" }, { "date": "2017-06-20T13:20:13.737000", "db": "NVD", "id": "CVE-2015-2800" }, { "date": "2017-06-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201504-531" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201504-531" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Campus Service operation interruption in user authentication module of switch products (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007609" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201504-531" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.