Vulnerabilites related to huawei - s3300
Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | ar_18-1x | * | |
huawei | ar_18-2x | * | |
huawei | ar_18-3x | * | |
huawei | ar_19\/29\/49 | * | |
huawei | ar_28\/46 | * | |
huawei | s2000 | r6305 | |
huawei | s2300 | r6305 | |
huawei | s2700 | r6305 | |
huawei | s3000 | r6305 | |
huawei | s3300 | r6305 | |
huawei | s3300hi | r6305 | |
huawei | s3500 | r6305 | |
huawei | s3700 | r6305 | |
huawei | s3900 | r6305 | |
huawei | s5100 | r6305 | |
huawei | s5600 | r6305 | |
huawei | s7800 | r6305 | |
huawei | s8500 | r1631 | |
huawei | s8500 | r1632 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*", "matchCriteriaId": "C169428A-DBA2-4AD4-AB2F-9B55F406D5F5", "versionEndIncluding": "r0130", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*", "matchCriteriaId": "F96CD3E2-2AE8-48B2-9979-84AD3C99933E", "versionEndIncluding": "r1712", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*", "matchCriteriaId": "A93A0EF1-FDC5-4E7C-A692-C664552913EF", "versionEndIncluding": "r0118", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9", "versionEndIncluding": "r2207", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*", "matchCriteriaId": "A520A0A9-2BF8-4E32-9194-3307CE52C2AD", "versionEndIncluding": "r0311", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "5AF996D4-838E-4295-B8E2-43512DC9BF41", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "6185A1C4-34B8-4FED-8144-15EA8012CA38", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "49B54F7F-0B13-4ADC-B8F5-72606273528E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "ABC5B0CA-8081-4492-8D2A-5FEE778C5E82", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "708E992F-581F-4DA0-A490-BB6E2BA8B598", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "7C8FA59E-F894-441D-8FBA-5D865BD3DFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "945EEE2E-C21E-4E1D-9D91-F5B0A77C7CDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "08E4AE20-F5FB-47DF-817E-DF7871121CA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "394161B5-65DF-4921-AE2B-0959322A71F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "F02BD40C-8825-46ED-9C99-A4DD5331F04A", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "47BCCDFB-27DB-439B-965C-525941118C87", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "0C3232F7-23AC-4773-A67D-BCA0A886FE3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*", "matchCriteriaId": "7D4B69FE-DC23-4A78-9D1A-C35EA98CB1FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*", "matchCriteriaId": "008D26B5-DC98-4592-B592-3728C8A0D6C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el m\u00f3dulo HTTP en el (1) Branch Intelligent Management System (BIMS) y (2) en el componente de gesti\u00f3n web en Huawei AR routers y switches S2000, S3000, S3500, S3900, S5100, S5600, S7800, y S8500 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante una URI de gran longitud." } ], "id": "CVE-2012-6569", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-20T15:55:00.950", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-14 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | s2350ei_firmware | * | |
huawei | s2350ei_firmware | * | |
huawei | s2350ei | - | |
huawei | s5300ei_firmware | * | |
huawei | s5300ei_firmware | * | |
huawei | s5300ei | - | |
huawei | s5300si_firmware | * | |
huawei | s5300si_firmware | * | |
huawei | s5300si | - | |
huawei | s5310hi_firmware | * | |
huawei | s5310hi_firmware | * | |
huawei | s5310hi | - | |
huawei | s6300ei_firmware | * | |
huawei | s6300ei_firmware | * | |
huawei | s6300ei | - | |
huawei | s5300li_firmware | * | |
huawei | s5300li_firmware | * | |
huawei | s5300li | - | |
huawei | s9300_firmware | * | |
huawei | s9300_firmware | * | |
huawei | s9300_firmware | v200r003c00 | |
huawei | s9300 | - | |
huawei | s7700_firmware | * | |
huawei | s7700_firmware | * | |
huawei | s7700_firmware | v200r003c00 | |
huawei | s7700 | - | |
huawei | s9700_firmware | * | |
huawei | s9700_firmware | * | |
huawei | s9700_firmware | v200r003c00 | |
huawei | s9700 | - | |
huawei | s2300_firmware | * | |
huawei | s2300 | - | |
huawei | s3300_firmware | * | |
huawei | s3300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39008864-1F6B-41B1-A07B-9F5227669ECF", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1457C7-F741-4A7B-B4D8-126190A0B870", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A8844AD-71F1-4139-B6CA-5534942DA424", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19788976-18BB-4B7A-AE46-558C779A9F2C", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7245FC5C-EF30-48A0-9294-4F61A1F784AE", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "438F46FA-6373-4323-B2C6-F4D6CFABD675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1818A8DD-58A0-41B2-9E8B-EC1851784654", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77856A0-E46B-4492-8C9F-5B5FEEFEDCED", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*", "matchCriteriaId": "498B6006-41C9-4853-8CCD-1A3A122FAB51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57D589CC-550B-4C9E-827C-3F745B9E86C5", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9932CAA1-D2DA-4DB5-9068-36A3F8B99558", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72B3B4B-1B7A-486C-A8BD-662390D585EB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13FEE8AC-82C1-45A1-AEEA-90DA113B28FC", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4B767F3-90A5-4B2D-BAA1-8FA0FC0A3FA0", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC63D2FE-F8BB-4A20-8DD6-801A12C06F7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9E6FE64-24E7-4126-81EB-CEDD5552CA69", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "149C309F-27C3-4B91-B83D-1A6D3877BB41", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*", "matchCriteriaId": "3696874A-E462-482F-8CA4-4FAC37C8641E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2218055E-B6F7-4C63-AA46-3563C4F9546A", "versionEndExcluding": "v200r001sph023", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE336196-B997-4613-A21B-6E543C12BFD6", "versionEndExcluding": "v200r003c00", "versionStartIncluding": "v200r002c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "473B6E52-E60F-4D3C-9028-E362DF2A8327", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9D64809-AD3A-4057-ABE6-EA53556F894A", "versionEndExcluding": "v200r001sph023", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2A6DC9F-6B9A-4A9B-AA9D-E50C45675C36", "versionEndExcluding": "v200r003c00", "versionStartIncluding": "v200r002c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "B1DFF0C0-AA17-4AA1-A418-4759D1A58852", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5961FF81-109C-4CF8-942D-ED9908981B69", "versionEndExcluding": "v200r001sph023", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DA3D055-9991-44A6-A250-C5119BF95857", "versionEndExcluding": "v200r003c00", "versionStartIncluding": "v200r002c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "06AD9ACA-E0C3-4096-BE50-94E717CDA318", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2D6DD87-D00C-4AB9-AC7F-BCF066DF6030", "versionEndExcluding": "v100r006sph022", "versionStartIncluding": "v100r006c05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB47AE0C-67AA-4605-B1F2-C51065C8786F", "versionEndExcluding": "v100r006sph022", "versionStartIncluding": "v100r006c05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets." }, { "lang": "es", "value": "Fuga de memoria en switches Huawei de la serie Campus S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI y S5300LI con software V200R001C00 en versiones anteriores a V200R001SPH018, V200R002C00 en versiones anteriores a V200R003SPH011 y V200R003C00 en versiones anteriores a V200R003SPH011; switches de la serie Campus S9300, S7700 y S9700 con software V200R001C00 en versiones anteriores a V200R001SPH023, V200R002C00 en versiones anteriores a V200R003SPH011 y V200R003C00 en versiones anteriores a V200R003SPH011; y switches de la serie Campus S2300 y S3300 con software V100R006C05 en versiones anteriores a V100R006SPH022 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria y reinicio) a trav\u00e9s de un gran n\u00famero de paquetes ICMPv6." } ], "id": "CVE-2015-8676", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-14T15:59:02.980", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" }, { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*", "matchCriteriaId": "CE81EA02-600F-42CE-92C8-7E1D127E9B7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "3A906E7E-7A10-474B-91C4-A30F7FAF55D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*", "matchCriteriaId": "B5D1A17D-1CDD-4539-897E-A6067EAD1EE2", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9", "versionEndIncluding": "r2207", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "B19CE2AB-251D-478A-913C-65B5E0BBA0B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*", "matchCriteriaId": "18BA268A-EF28-477C-AC24-38E322FFE553", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*", "matchCriteriaId": "554B2AC0-F4C6-4805-BB39-642D6D292A97", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "2BB1A47C-FB4F-4EF8-A614-95F3B2E6065D", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*", "matchCriteriaId": "C26B81D9-0A62-4F6E-A9A4-5B22F08E0882", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "A24ECC75-1032-4DFD-A0C3-315ABB68C50F", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "0F9BA9C4-65A8-4D9D-A21C-CEB53DB2E513", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "D71F25CF-F4DE-4FC5-82E9-179CFFA4CA61", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*", "matchCriteriaId": "5D94D86A-C025-4A96-A700-D676B90CBBF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*", "matchCriteriaId": "3F61F187-74C5-4C50-9F91-6303C87582B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*", "matchCriteriaId": "BB2B2269-0784-4DE2-B48A-9A36F9B30F96", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*", "matchCriteriaId": "9151ED5E-04DD-4221-9669-C8112168A507", "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*", "matchCriteriaId": "F63E41F8-8408-4E7A-A423-ACC2C44B3141", "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*", "matchCriteriaId": "8235FC6D-220F-4F75-BDD2-77FA661F33A2", "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*", "matchCriteriaId": "04FF6514-05AF-4D86-9B10-B50BC8D0622D", "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*", "matchCriteriaId": "D14FD9A2-90D5-493C-9BC7-095EBD644114", "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*", "matchCriteriaId": "25B60ADA-D40C-48C5-A237-DEE5DD372933", "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3502D88-6168-41E3-8641-4045C9EA9B90", "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F6DBFF5-0B0B-4F0D-96A1-D2D487AE57C7", "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AF99475-D5A4-407E-8A7F-D6642186E5B6", "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D68DD7D-29F9-460E-9D9C-A70F0DD489B1", "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5A801B9-7BB4-4E06-8ED2-D9EF565F313E", "versionEndIncluding": "v100r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E9D04EF-A73F-4BF6-AB34-3C489156BBD3", "versionEndIncluding": "v100r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*", "matchCriteriaId": "3510EF8C-F3EB-4531-A0A8-8E0734652E26", "versionEndIncluding": "v200r001", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "F08A74A7-65FC-424C-ACAD-B6A6ED27FF60", "versionEndIncluding": "v200r002", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*", "matchCriteriaId": "788B8EBF-16FA-4FDD-B07A-5A4F6E6B310A", "versionEndIncluding": "v100r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C625CA3-BD79-42E8-91B4-539E90FBF0C5", "versionEndIncluding": "v200r001c00spc600", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFF18B94-150C-413F-B6D4-47B5E05DF4BA", "versionEndIncluding": "v200r006c02", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBB0AFBD-5F0E-494A-A752-9EE2F81DF2C5", "versionEndIncluding": "v200r001", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D8297A-362B-4056-A94F-9D49FF0B56B7", "versionEndIncluding": "v200r002", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*", "matchCriteriaId": "956ED431-6CE1-4873-BDC3-7832F5867C28", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "5679FA9F-B4E5-42A9-9B9A-3601BE785CC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*", "matchCriteriaId": "014E4B7B-E107-40B6-9B18-F5610959EA8B", "versionEndIncluding": "v200r006c02", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0CA4ACA-0104-4A93-9FBC-DC0496A1EB70", "versionEndIncluding": "v200r006c02", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B686C4E-FD19-42B0-87A5-162D72C47BE0", "versionEndIncluding": "v200r001c00spc600", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "FBDEE398-3BC9-4855-952F-44B37BF9F478", "versionEndIncluding": "r2209", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "8D17E429-865D-4677-872E-1E191BB0A6DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*", "matchCriteriaId": "CD2ADD48-FBB4-4E65-8486-757D2ADA4DA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "1AF75F78-2B91-47C3-B5AE-F4C9769B5AD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "18496123-2B0E-46D1-88F6-85897B2B65B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*", "matchCriteriaId": "E0045741-3B14-435E-8B12-B536751DD24F", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*", "matchCriteriaId": "AE8094F7-FAB2-4624-B2ED-467B40ADA260", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*", "matchCriteriaId": "4BC19826-AC6E-4DE1-95CA-49D4BB6F6644", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*", "matchCriteriaId": "49D7692F-6EA0-4A5E-B841-2B49332FCC5D", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*", "matchCriteriaId": "C555EAC5-1E45-4BE5-8C69-DB1916A2EBF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*", "matchCriteriaId": "AFF2311E-D7DE-4C7C-BD88-4B947BD4F8E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*", "matchCriteriaId": "B23A5D99-8458-4285-ABF8-FA0D2F49B811", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*", "matchCriteriaId": "5348DF82-072D-4B3B-9919-B5478420A98F", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*", "matchCriteriaId": "54C3C26D-0FD0-48B9-A168-E9C6605DCB0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*", "matchCriteriaId": "3D4D3971-B2DA-44EC-97A1-CFF436BF44F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*", "matchCriteriaId": "CDA4A9B6-378D-4F4B-B88D-C13859E6236B", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*", "matchCriteriaId": "FF6322F0-0749-4C3D-9144-D92A64B9D5FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*", "matchCriteriaId": "74801C9A-31D1-4E74-9211-9AB67B5FEAB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*", "matchCriteriaId": "AA2D277B-08F0-4F6A-BC99-FBBCA4F5207D", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*", "matchCriteriaId": "A81A4563-15DC-4125-9E3D-5B9FB0360EA2", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*", "matchCriteriaId": "449449A2-28B2-4A9A-A2C9-84A18596AEDF", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*", "matchCriteriaId": "2BE4E8E1-AF7C-49E9-9758-887EFD8CB8F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*", "matchCriteriaId": "90FF10E6-4080-4186-83DE-37703A468F3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*", "matchCriteriaId": "6B0009DF-D44E-4D96-909F-B911D7BA127B", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "B8CE9794-9A67-4F65-A81A-EE00AE714A88", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "B3DC0192-8E8B-4E0C-A91C-92094A167878", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "9317FE4B-95F0-4615-9FA1-683D644BC3E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*", "matchCriteriaId": "871BB53D-F86F-4E3D-8DF7-875C8C1C7FDE", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*", "matchCriteriaId": "7E655344-8341-4FFA-BBED-F5D5A15759D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "662EDAE9-2B0F-4774-8790-2C62997764FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "22621191-B2CD-4BA9-B6F1-8D59850604A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "142335E6-A4F5-4CC4-8D86-835C3E0E5211", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*", "matchCriteriaId": "AF7B5B70-1540-490F-8486-31639DB54F12", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*", "matchCriteriaId": "33864641-EB9A-4CCC-9057-26D22AD839BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "59AD4C23-6315-4B97-85BB-1074F36F7291", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "972BB8A0-27D8-4A0A-865E-57E37F70A484", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "41435CB4-537C-45DC-B8DB-0C1F38F1D222", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "6D5FE313-7374-4D7A-9A01-F389311710C5", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "7EF096DC-B6F4-4763-AC6B-72CB46AB1976", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "D1171FC3-5A2E-40C6-85FF-AF7E78F96C87", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "A706C2B0-5E15-4C90-910F-0ABB65573C93", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*", "matchCriteriaId": "2295584A-2664-45AE-BA0C-1B0411F29A13", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*", "matchCriteriaId": "DDA542A3-7BB3-42B6-ACBB-D00AD4AD707A", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "5361C4C5-BBC5-42FE-A575-985B57EF575E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "75A90C9F-8DAE-45B4-BB78-6080A434E5FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "175A8714-CD80-472B-9507-829EBC59B805", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "81195EA9-D62B-492D-AA37-EF7AD17AED7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "47052A6F-E532-42B6-9B4B-46424A1F6377", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "8B22E5AB-DAF6-4020-A62E-BE6FBE57D3DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "3C178B6F-8608-4BBE-A8D8-8798FB1D75E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "29CAD535-0216-4048-BFDA-863AA5425BA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "9424F3B6-A280-4043-A670-3768D9515631", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "4FB869CD-37F8-4E77-8065-B9C8FADED40C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "C22B5DE3-03ED-4ED4-BD86-278197FA3FC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "652F2CCF-41FE-4DEC-8179-FF285AB99E52", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "66149AA8-E897-4563-97EC-C5EDCDBE072B", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*", "matchCriteriaId": "0B3F7637-0B4C-40D0-B814-B19F10118795", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "04686A95-05CF-4ACC-89E5-2140DFC423F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*", "matchCriteriaId": "63BB797D-2C82-4A55-A26A-61A6C1C86888", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*", "matchCriteriaId": "465F6E51-0676-4443-9122-CB2AD59C7516", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*", "matchCriteriaId": "94970073-415B-4358-833F-CC220653376D", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "F26E31D2-31F8-4D4F-AD3A-44C59B22B121", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "59513736-11B7-47E6-B5C4-D33F9E032BEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*", "matchCriteriaId": "931A86E3-43C1-4C72-8425-862C33A2DBA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "15EBA968-C3E0-430E-944D-B4DA30B932C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*", "matchCriteriaId": "17A15567-DC96-4513-8681-93CE26B4FA07", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "1968B0D3-1653-459A-865D-79DBB9AADEE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*", "matchCriteriaId": "7490231F-7FAB-4875-812F-657B7BF4F136", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack." }, { "lang": "es", "value": "Los Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, y NIP5100 utiliza el algoritmo DES para las contrase\u00f1as almacenados, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes dependientes de contexto obtener contrase\u00f1as de texto simple a trav\u00e9s de un ataque de fuerza bruta." } ], "id": "CVE-2012-4960", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-20T15:55:00.897", "references": [ { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/948096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/948096" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2025-04-20 01:37
Severity ?
Summary
Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "859A83C4-3AA0-45EA-87DE-CCE978D73474", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r002c00:*:*:*:*:*:*:*", "matchCriteriaId": "CA904391-4350-4C84-A39E-C9CE8DC78C44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ac6605:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1E5AE5-EBB2-4E05-A3C7-E2CA54205FF7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:acu_firmware:acu_v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "30C4DFFF-9A41-4351-B608-8CCCFFB80505", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:acu_firmware:acu_v200r002c00:*:*:*:*:*:*:*", "matchCriteriaId": "C8BB0D86-0EFE-48D8-941E-53F574987CD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:acu:-:*:*:*:*:*:*:*", "matchCriteriaId": "60FE6911-4BC0-48D7-8E38-88BDF8E4B5F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s_series_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "D775B6F0-99F2-4F93-ADE5-9006E511B0C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2CD071-58E4-4061-8217-990453213470", "vulnerable": false }, { "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7F84390-E120-406B-967D-B473EB110EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E21E7C93-95A0-4685-9844-40495011C279", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "4A7A8C30-4C01-4958-A6B3-03337B78366E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "A0D0E1B7-3843-4E18-88AC-D851E9231728", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "258F4E81-9B8A-4133-868D-8829098443D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "2E3CCFD9-46A6-4A56-9300-DF8E6F35446B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D754D004-C6B3-458A-ADE7-F66CC7F6392E", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "CBE6AAB7-B389-48DF-9732-38FE988DB2D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "BA745187-432A-4BCA-8FE6-0A1F4FDBB010", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "60AE0EC6-91F2-4058-9F1B-906F02828976", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "A59BADD8-584B-4E53-8386-4B8ADA947CFE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "174812BF-795B-4945-B637-3E0E9CFD247F", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "E6804EC1-E774-43B9-B513-896F53AFCD2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "16289CCE-0803-4AB1-AE98-73F78580C3BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "1F3C5718-DC84-456F-9816-052395BCF3FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "D82C04A8-3884-42E5-BE38-E1AAE842A759", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA7AC10D-B0DD-4206-8642-134DDD585C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C42CBC6-ADE7-4B16-835C-D06FA23F47BD", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "5B127953-86A8-495E-8868-7764F8A8C76E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "C8E49AF7-A906-4CB2-83E2-D263A7E852B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "4CFA05B8-4462-4D11-8A9F-488AF0287FF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "3A7E8867-76FF-4834-A6FF-08537BD6AE8E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A234C65E-2B24-451E-97D2-43440C072043", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "C3FA00DD-61AE-44CA-B995-7BE5249F8F20", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "89C05EAD-1274-42FE-AEF3-7AD5B0DAF65D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "FB355FCB-9A98-49D4-878A-A6EE5DC8A3AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "B2047FBF-4E62-458C-8AF9-C03ED9D9309E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E05A2C5-3BF8-451C-95D3-71BEFCC08DC6", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "7BBF657B-A249-459F-BE89-FAD3AF4AA791", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "C60B2971-FE60-4B4F-AAC1-73B9E932135D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "6A231837-BC55-47DF-BB64-EDD52B9901DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "7062DE16-0EDF-45B3-AF49-150581176FF2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4732A3E-C3BC-427D-B0A4-31B2B24A411F", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "F32B3FFA-DD66-47A0-AB26-5CC385D898A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "C2E49E77-F8E3-40EA-BD94-5911DC93FEE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "E9B9B68D-C9F2-42AB-8287-0D1744DB0DDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "8FE55995-6CE6-4142-BBCF-D268D0967AE0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA033B4D-46F1-43AD-B5A7-9AF96B3DE6A9", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "3712D5B6-0D98-422F-8270-C151A2788984", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "EEACD3C6-6D1D-4070-8962-D0CD485AA754", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "0A319D8E-17B1-4E61-B61C-596DCBF86475", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "E721F5DD-8F2D-4A1C-9456-FB6476066661", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B913A258-48B6-45D0-A37B-2C665DCA735C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service." }, { "lang": "es", "value": "Huawei AC6605 con software V200R001C00; AC6605 con software V200R002C00; ACU con software V200R001C00; ACU con software V200R002C00; S2300, S3300, S2700, S3700 con software V100R006C05 y versiones anteriores; S5300, S5700, S6300, S6700 con software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 y versiones anteriores; S7700, S9300, S9300E, S9700 con software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 y versiones anteriores podr\u00edan permitir a atacantes remotos enviar un paquete SSH especial al dispositivo VRP para provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2014-8572", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-02T20:59:00.423", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-08 19:29
Modified
2024-11-21 02:11
Severity ?
Summary
Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701 | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/69302 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/97763 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/69302 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/97763 | Third Party Advisory, VDB Entry |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "2D1EF10E-F18B-4F3A-AA2B-25003183E19D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "54D5B323-BFB3-4A0A-B1E1-37E4DC4FF984", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "78DA2DC7-63B3-40D7-BEC7-AF81066A2733", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "BB3FA8B2-A788-408C-AD24-AE5BA2501139", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "8F3D1698-CBF3-4C2C-B581-343FBD8E8831", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "E5752E4C-4B7D-4139-BCAE-7F52D4A235F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B913A258-48B6-45D0-A37B-2C665DCA735C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "07A44DEA-AB17-48F4-87C1-B3B6088BCD82", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "FD36DBAD-B0A9-4A16-AE6A-D3949A1764D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "5D0B5718-9465-476F-B2FA-FFC6FB08E354", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "E4EE71EF-90D8-40C6-9E80-A543ED32E976", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "8C2BF2B6-915B-4F57-8C75-CD09612985F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "CBDBE325-B6F4-475F-B7F8-F3142F730039", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "121BEE57-945E-4368-8AE4-4A823D70D31C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "A802134B-7EC8-4935-878A-4DCD730BCD4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "DEC329F7-D83F-4119-B8CA-CC819EC872CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "4AF84CB7-7EC9-4978-A4F6-FD5746AF1CE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "279D9CE4-AAEF-4EFC-8340-668CFCF47717", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "7D5033F0-7E4F-431A-B4EA-E5D5D1FCFE5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA7AC10D-B0DD-4206-8642-134DDD585C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "93E7A87E-E2FB-4852-9BE5-164822801822", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "BA5C970C-03B5-4757-B3B8-34CF1DFC3482", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "9D07FB95-7CE7-480A-BF2D-87017EFAE038", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "7082EE3F-3174-42C2-B010-5078DC752D67", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "73796844-B30E-4040-AF4E-105AB6BA357F", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "2CB0108A-2462-45D6-8A82-8681E8167D6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "0B863F3A-38C5-4E36-8E71-713B12EE6889", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D9357-D179-4B24-A073-17BA09AEC7E9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2CD071-58E4-4061-8217-990453213470", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "3DBB1A49-B169-40F4-B611-C739896A2A71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "021F224A-F28F-4192-883C-8A75898BEA84", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7F84390-E120-406B-967D-B473EB110EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal." }, { "lang": "es", "value": "M\u00faltiples switches Huawei Campus permiten que los atacantes remotos enumeren los nombres de usuario mediante vectores que involucren el uso de SSH por el terminal de mantenimiento." } ], "id": "CVE-2014-5394", "lastModified": "2024-11-21T02:11:58.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-08T19:29:00.610", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/69302" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/69302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | ar_18-1x | * | |
huawei | ar_18-2x | * | |
huawei | ar_18-3x | * | |
huawei | ar_19\/29\/49 | * | |
huawei | ar_28\/46 | * | |
huawei | s2000 | r6305 | |
huawei | s2300 | r6305 | |
huawei | s2700 | r6305 | |
huawei | s3000 | r6305 | |
huawei | s3300 | r6305 | |
huawei | s3300hi | r6305 | |
huawei | s3500 | r6305 | |
huawei | s3700 | r6305 | |
huawei | s3900 | r6305 | |
huawei | s5100 | r6305 | |
huawei | s5600 | r6305 | |
huawei | s7800 | r6305 | |
huawei | s8500 | r1631 | |
huawei | s8500 | r1632 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*", "matchCriteriaId": "C169428A-DBA2-4AD4-AB2F-9B55F406D5F5", "versionEndIncluding": "r0130", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*", "matchCriteriaId": "F96CD3E2-2AE8-48B2-9979-84AD3C99933E", "versionEndIncluding": "r1712", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*", "matchCriteriaId": "A93A0EF1-FDC5-4E7C-A692-C664552913EF", "versionEndIncluding": "r0118", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9", "versionEndIncluding": "r2207", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*", "matchCriteriaId": "A520A0A9-2BF8-4E32-9194-3307CE52C2AD", "versionEndIncluding": "r0311", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "5AF996D4-838E-4295-B8E2-43512DC9BF41", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "6185A1C4-34B8-4FED-8144-15EA8012CA38", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "49B54F7F-0B13-4ADC-B8F5-72606273528E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "ABC5B0CA-8081-4492-8D2A-5FEE778C5E82", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "708E992F-581F-4DA0-A490-BB6E2BA8B598", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "7C8FA59E-F894-441D-8FBA-5D865BD3DFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "945EEE2E-C21E-4E1D-9D91-F5B0A77C7CDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "08E4AE20-F5FB-47DF-817E-DF7871121CA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "394161B5-65DF-4921-AE2B-0959322A71F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "F02BD40C-8825-46ED-9C99-A4DD5331F04A", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "47BCCDFB-27DB-439B-965C-525941118C87", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "0C3232F7-23AC-4773-A67D-BCA0A886FE3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*", "matchCriteriaId": "7D4B69FE-DC23-4A78-9D1A-C35EA98CB1FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*", "matchCriteriaId": "008D26B5-DC98-4592-B592-3728C8A0D6C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack." }, { "lang": "es", "value": "El m\u00f3dulo HTTP en el (1) Branch Intelligent Management System (BIMS) y (2) gesti\u00f3n web de componentes para switches Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 usa valores de Session ID predecibles lo que hace m\u00e1s f\u00e1cil a atacantes remotos secuestrar la sesi\u00f3n a trav\u00e9s de ataques de fuerza bruta." } ], "id": "CVE-2012-6571", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-20T15:55:00.983", "references": [ { "source": "cve@mitre.org", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | ar_18-1x | * | |
huawei | ar_18-2x | * | |
huawei | ar_18-3x | * | |
huawei | ar_19\/29\/49 | * | |
huawei | ar_28\/46 | * | |
huawei | s2000 | r6305 | |
huawei | s2300 | r6305 | |
huawei | s2700 | r6305 | |
huawei | s3000 | r6305 | |
huawei | s3300 | r6305 | |
huawei | s3300hi | r6305 | |
huawei | s3500 | r6305 | |
huawei | s3700 | r6305 | |
huawei | s3900 | r6305 | |
huawei | s5100 | r6305 | |
huawei | s5600 | r6305 | |
huawei | s7800 | r6305 | |
huawei | s8500 | r1631 | |
huawei | s8500 | r1632 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*", "matchCriteriaId": "C169428A-DBA2-4AD4-AB2F-9B55F406D5F5", "versionEndIncluding": "r0130", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*", "matchCriteriaId": "F96CD3E2-2AE8-48B2-9979-84AD3C99933E", "versionEndIncluding": "r1712", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*", "matchCriteriaId": "A93A0EF1-FDC5-4E7C-A692-C664552913EF", "versionEndIncluding": "r0118", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9", "versionEndIncluding": "r2207", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*", "matchCriteriaId": "A520A0A9-2BF8-4E32-9194-3307CE52C2AD", "versionEndIncluding": "r0311", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "5AF996D4-838E-4295-B8E2-43512DC9BF41", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "6185A1C4-34B8-4FED-8144-15EA8012CA38", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "49B54F7F-0B13-4ADC-B8F5-72606273528E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "ABC5B0CA-8081-4492-8D2A-5FEE778C5E82", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "708E992F-581F-4DA0-A490-BB6E2BA8B598", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "7C8FA59E-F894-441D-8FBA-5D865BD3DFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "945EEE2E-C21E-4E1D-9D91-F5B0A77C7CDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "08E4AE20-F5FB-47DF-817E-DF7871121CA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "394161B5-65DF-4921-AE2B-0959322A71F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "F02BD40C-8825-46ED-9C99-A4DD5331F04A", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "47BCCDFB-27DB-439B-965C-525941118C87", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "0C3232F7-23AC-4773-A67D-BCA0A886FE3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*", "matchCriteriaId": "7D4B69FE-DC23-4A78-9D1A-C35EA98CB1FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*", "matchCriteriaId": "008D26B5-DC98-4592-B592-3728C8A0D6C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response." }, { "lang": "es", "value": "El m\u00f3dulo HTTP en (1) Branch Intelligent Management System (BIMS) y (2) componentes de gesti\u00f3n web de switches de Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, y S8500 no comprueba si los datos HTTP son mayores que el valor del campo Content-Length, que permite a los servidores HTTP remotos realizar ataques de desbordamiento de b\u00fafer basado en mont\u00edculo y ejecutar c\u00f3digo arbitrario a trav\u00e9s de una respuesta elaborada." } ], "id": "CVE-2012-6570", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-20T15:55:00.967", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-14 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD722A3F-A17A-4C2F-BF97-B4EC3E1313AB", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A16F8DA-E9B5-4501-BD07-DCCBC998B5B8", "versionEndExcluding": "v200r005sph008", "versionStartIncluding": "v200r005c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "438F46FA-6373-4323-B2C6-F4D6CFABD675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1818A8DD-58A0-41B2-9E8B-EC1851784654", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77856A0-E46B-4492-8C9F-5B5FEEFEDCED", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*", "matchCriteriaId": "498B6006-41C9-4853-8CCD-1A3A122FAB51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57D589CC-550B-4C9E-827C-3F745B9E86C5", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9932CAA1-D2DA-4DB5-9068-36A3F8B99558", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72B3B4B-1B7A-486C-A8BD-662390D585EB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13FEE8AC-82C1-45A1-AEEA-90DA113B28FC", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4B767F3-90A5-4B2D-BAA1-8FA0FC0A3FA0", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC63D2FE-F8BB-4A20-8DD6-801A12C06F7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B7C59A1-526B-43D1-BFF6-A78DB487B228", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "478CEF58-3701-46B7-9CB6-3AB47E502FC3", "versionEndExcluding": "v200r005sph008", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFCF982C-559F-4074-9C74-C0C473A93262", "versionEndExcluding": "v200r006sph002", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*", "matchCriteriaId": "3696874A-E462-482F-8CA4-4FAC37C8641E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA26DEFB-04A3-41F9-A8B3-F3AC06B5EC8A", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E5D2580-1C41-4367-8A4D-298030C051F1", "versionEndExcluding": "v200r005sph008", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "909F4FF5-B874-4E0B-A6F1-A2E9FE110381", "versionEndExcluding": "v200r006sph002", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A8844AD-71F1-4139-B6CA-5534942DA424", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B0F9954-F0E2-4D1A-8641-E32E424B80FD", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14879FE3-07A4-4F07-9325-F153170E2017", "versionEndExcluding": "v200r005sph009", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "614CAF39-2122-4206-905C-C6743656C73A", "versionEndExcluding": "v200r006sph003", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0E2E640-EC67-40CC-8EF2-3E61195E8B68", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "398CABF6-F1D2-4A66-B4EE-45CB2A0F1B6E", "versionEndExcluding": "v200r005sph009", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5F28803-5FC5-4904-9D79-0A3B15F8D1C8", "versionEndExcluding": "v200r006sph003", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BCAD4F5-CA86-441B-A542-6AA797F621B5", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CA11961-ED08-4931-88F4-AC1E9D191E5D", "versionEndExcluding": "v200r005sph009", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75C05E42-CCCD-446F-BDAB-0CD8FDBEE519", "versionEndExcluding": "v200r006sph003", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5720hi_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEF5A073-7D11-4875-A7C4-F1298AF6A86D", "versionEndExcluding": "v200r006sph002", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB64BC36-693E-4101-9C13-4A4C572A4EDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5720ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "991916AB-5080-42CA-80CE-AFD1E69005E7", "versionEndExcluding": "v200r006sph002", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5720ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7B06975-BD37-452D-9782-B768610D3777", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2D6DD87-D00C-4AB9-AC7F-BCF066DF6030", "versionEndExcluding": "v100r006sph022", "versionStartIncluding": "v100r006c05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB47AE0C-67AA-4605-B1F2-C51065C8786F", "versionEndExcluding": "v100r006sph022", "versionStartIncluding": "v100r006c05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information." }, { "lang": "es", "value": "Fuga de memoria en switches Huawei de la serie Campus S5300EI, S5300SI, S5310HI y S6300EI con software V200R003C00 en versiones anteriores a V200R003SPH011 y V200R005C00 en versiones anteriores a V200R005SPH008; switches de la serie Campus S2350EI y S5300LI con software V200R003C00 en versiones anteriores a V200R003SPH011, V200R005C00 en versiones anteriores a V200R005SPH008 y V200R006C00 en versiones anteriores a V200R006SPH002; switches de la serie Campus S9300, S7700 y S9700 con software V200R003C00 en versiones anteriores a V200R003SPH011, V200R005C00 en versiones anteriores a V200R005SPH009 y V200R006C00 en versiones anteriores a V200R006SPH003; switches de la serie Campus S5720HI y S5720EI con software V200R006C00 en versiones anteriores a V200R006SPH002; y switches de la serie Campus S2300 y S3300 con software V100R006C05 en versiones anteriores a V100R006SPH022 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de memoria y reinicio de dispositivo) iniciando sesi\u00f3n y cerr\u00e1ndola en el servidor (1) HTTPS o (2) SFTP, relacionada con la informaci\u00f3n de sesi\u00f3n SSL." } ], "id": "CVE-2015-8677", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-14T15:59:03.857", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2025-04-20 01:37
Severity ?
Summary
S3300 V100R006C05 have an Ethernet in the First Mile (EFM) flapping vulnerability due to the lack of type-length-value (TLV) consistency check. An attacker may craft malformed packets and send them to a device to cause EFM flapping.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@huawei.com | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170118-01-vrp-en | Vendor Advisory | |
psirt@huawei.com | http://www.securityfocus.com/bid/95662 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170118-01-vrp-en | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/95662 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | s3300_firmware | v100r006c05 | |
huawei | s3300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "3DBB1A49-B169-40F4-B611-C739896A2A71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "S3300 V100R006C05 have an Ethernet in the First Mile (EFM) flapping vulnerability due to the lack of type-length-value (TLV) consistency check. An attacker may craft malformed packets and send them to a device to cause EFM flapping." }, { "lang": "es", "value": "S3300 V100R006C05 tiene una vulnerabilidad de oscilaci\u00f3n de Ethernet in the First Mile (EFM) debido a la falta de comprobaci\u00f3n de consistencia de tiempo-longitud-valor (TLV). Un atacante podr\u00eda manipular paquetes mal formados y enviarlos a un dispositivo para provocar la oscilaci\u00f3n EFM." } ], "id": "CVE-2017-2712", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-22T19:29:01.020", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170118-01-vrp-en" }, { "source": "psirt@huawei.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170118-01-vrp-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95662" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-417" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-08 21:29
Modified
2025-04-20 01:37
Severity ?
Summary
The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "C9D7CB90-6F2C-4012-8E57-F3B85F9D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "FEFF6D05-BC82-4943-9D79-95CBEDD5CD2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "0B863F3A-38C5-4E36-8E71-713B12EE6889", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "02401EA6-28B6-4424-B182-C20CD081FFD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "3EA85312-3C8F-4F1F-8138-1A091C453193", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D9357-D179-4B24-A073-17BA09AEC7E9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2CD071-58E4-4061-8217-990453213470", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "22A2763B-2A83-4C0A-BA11-2B22CE834EDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "8C328054-3E5C-4122-AD5B-49A71791D7F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "3DBB1A49-B169-40F4-B611-C739896A2A71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3700_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "7002CF50-20B6-4CB5-8EDE-8B35C7435D6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s3700_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "85611E3B-826E-4B8F-884B-C121DE4EECEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "021F224A-F28F-4192-883C-8A75898BEA84", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7F84390-E120-406B-967D-B473EB110EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "EB980280-1737-47E2-8524-06C2EB3E3A44", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "8239CCD8-B83E-4BC0-9F80-F192CE486A4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "1A43BCB4-6D92-408E-A73E-CF87CD346E0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "030E1304-CCFB-4433-A367-0D2A1B574914", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "5B196776-C623-4161-8BFB-3F408DB63253", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "438F46FA-6373-4323-B2C6-F4D6CFABD675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "E881F881-A952-4E28-93A5-8EDFF2FC08BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "860D9897-72D7-48BC-AAA8-89EDC787DA36", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "FC32DB6F-2C8F-45C7-BF80-9750EDAFE1C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "C3B1BE75-73A8-424A-9B4B-1BBF64C34E23", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "B43D90EA-9BB1-49AE-9076-939D20217917", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B0BE6C3-1FB2-4718-AA9D-1A8D8663C195", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "BDBAD45D-6AFB-4A5B-82E8-ED4D15DBF925", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "7A61C07A-A249-4EA4-8B33-604A70707757", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "5BC533FD-445D-4198-9230-46051233EBC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "B76A602C-EC5B-48A9-BDF6-07A43BFF925C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "1599C015-4E36-4C8E-BE07-351DA50F960B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*", "matchCriteriaId": "498B6006-41C9-4853-8CCD-1A3A122FAB51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "210E88DD-C61B-4E70-B412-ABF4B73F3BC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "E89C6C1C-AE55-44DC-A9A0-C6B2A8646AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "EE9C1F25-98EC-43B0-B0C6-6DBFA2CD3A96", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "7B019E52-17FB-48D9-A301-B4E1855B0C59", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "265C8691-8272-4C48-BE25-8B2B51C15888", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700si:-:*:*:*:*:*:*:*", "matchCriteriaId": "24C4DC87-DE8C-461F-A555-F6E9A71C1C48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "73686E67-21C2-45B0-A105-A2AB5B3E7218", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "350FCDA4-19BF-4E63-B7C9-A1159A267EBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "6563866F-D1E3-4B8B-9D08-AA952F610556", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "77512809-D6F1-4F19-8B79-70CC973FC6C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B4C8E2-7928-41FF-ACF7-E2CF28501997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "4F365BF7-A73E-4628-98E7-06A6C819B38F", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "F6CFB46C-A6E3-49C4-84A9-B682BD2AF13D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "1CBAA8F6-0AE2-4287-A3F1-64198AAF7151", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "3C341CDB-A532-4B87-9DF5-D0576412DC8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED775342-B93C-4DF9-BC62-B6BE549F1B29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "8FD5B574-03D0-4111-B4AF-3732012C2E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "22644C5E-1ABF-433B-AD38-13533395F456", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "806F90CD-1EDA-4148-8938-DDC78B3DE82D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "36314640-E462-42EB-9BE6-B4683B9DA7B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC63D2FE-F8BB-4A20-8DD6-801A12C06F7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "10DD372D-3ED3-4E80-85DB-5E03BF4F38BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "68CEEFD6-7FFD-498A-841F-A4664157033B", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "AC040EE3-4CC8-42CC-A03B-89F4061A3B07", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "D68F9EF2-A93E-4CE1-9A7C-7097BDAF18C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6700ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "F09DBA68-6F2E-42B1-B62C-50ED5317D363", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "DC1062F4-6272-4C69-9F52-B2D04BF8B04A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "CA4B9066-4940-4BCF-A11A-65E4D3F9819E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "8FBC1C70-C1C0-4CAD-9616-039E80837983", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "59EBEED2-52C2-4F9E-919C-C4C6B3617D68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5710hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DFF0F26-CDF2-49B0-AED7-EEA4B9E99E8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "3E037F4C-EA5B-4526-9182-F028E580C361", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "6DE63BF3-2EE8-4AB7-91D1-E83D2DFF0F9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "97C17461-23DF-4E9C-9806-102F06D66045", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "BFD9B623-1853-4F2B-B89B-1E31B3AC743A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "E849DDBF-80AC-4736-88A2-E6EECCC8CE4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "983B3479-E7EE-49C2-82D5-02B6620B5479", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*", "matchCriteriaId": "3696874A-E462-482F-8CA4-4FAC37C8641E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "18E9BB0F-6A34-490E-82EC-ADE12AC3E649", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "2B171E0D-91E5-4EC6-9C0F-FAB2BC0A3915", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "B338780D-71EB-44A1-A95B-26C240586FAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "EC27F896-EF43-40D4-A436-212E865BF699", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "D2570A5D-2AC0-495C-BF99-2E19A9B8217F", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "D60AF421-5F71-43CC-B852-B16063B26F66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B89917-2B3D-4BA5-8836-ADEECF46E976", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "0C15E318-E188-46CD-B7B5-AFDDB12137E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "01A6ECDF-0606-45BD-8574-76508DB88669", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "C1C446CC-A622-4E08-9FDE-399EBDB3C3B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "B73AADFE-502E-43B0-BAE2-9E99ACFC5799", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "C5E2F24F-D185-4529-BFA3-E3B6CED7ABED", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "4AB4D0E0-636B-47CC-8A9C-86D2937F59A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A8844AD-71F1-4139-B6CA-5534942DA424", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "98BD1EFD-29F1-495E-8701-EFF2CC710F4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "D8E01D70-2DEC-4A5B-B33E-5665B9200B96", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "D376B21B-5B1C-44F3-A4A3-0650EBC1A0C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "7B2FAA30-8F9C-4993-8F24-72D7CFA8EBDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "FC43FCD5-E820-44E9-8C2F-63F252BA4042", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "F5C14E76-DE28-44C1-84FC-6A61B1CE77BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2750ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "7770B303-C595-4D00-961B-23BCCCEBC725", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5720hi_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "7635D7EE-D274-42C5-A627-E2C77F4753DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5720hi_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "7520E268-DFAC-4CC1-AEC5-08844E95CECE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB64BC36-693E-4101-9C13-4A4C572A4EDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "07A44DEA-AB17-48F4-87C1-B3B6088BCD82", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "FD36DBAD-B0A9-4A16-AE6A-D3949A1764D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "5D0B5718-9465-476F-B2FA-FFC6FB08E354", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "13FB139B-C0C2-4BB5-BA60-E1B32030F9E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "DC191A39-26C6-4503-9152-A29A2EAAC6BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "F368821C-C253-4584-B53C-F6BBA0186433", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "2D1EF10E-F18B-4F3A-AA2B-25003183E19D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "54D5B323-BFB3-4A0A-B1E1-37E4DC4FF984", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "78DA2DC7-63B3-40D7-BEC7-AF81066A2733", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "A066F4B8-2258-4ED2-A166-02FCA7C9F3A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "DDA38762-CACE-403B-8DE5-42E0306FEB28", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "989CE0D9-95CE-4571-A89F-EE083C63CFB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "E4EE71EF-90D8-40C6-9E80-A543ED32E976", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "8C2BF2B6-915B-4F57-8C75-CD09612985F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "CBDBE325-B6F4-475F-B7F8-F3142F730039", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "CAB593E5-D919-436C-A10A-6FA72B69EA55", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "464C5DF2-E6D7-4679-A375-521FD730CA14", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "8D4F46F5-1BD2-444E-84B9-09DC4440B355", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "C5234B43-EA0C-45C9-B188-4D6085F031F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "F8A79318-19CF-4097-9B49-A9BF7CD9E716", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "CAEE3E52-4646-4D35-931B-4739E059732F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "matchCriteriaId": "138C1E57-176C-46B1-9704-D9C8391CC802", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message." }, { "lang": "es", "value": "En varios modelos de switch de la serie Huawei Campus, la pila IP permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio) a trav\u00e9s de un mensaje de solicitud ICMP manipulado." } ], "id": "CVE-2015-3913", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-08T21:29:00.377", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2025-04-20 01:37
Severity ?
Summary
Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@huawei.com | http://www.huawei.com/en/psirt/security-advisories/hw-329625 | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/en/psirt/security-advisories/hw-329625 | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | s9300_firmware | v100r006c00spc500 | |
huawei | s9300_firmware | v100r006c00spc800 | |
huawei | s9300 | - | |
huawei | s3300_firmware | v100r006c00spc800 | |
huawei | s3300_firmware | v100r006c01spc100 | |
huawei | s3300_firmware | v100r006c03 | |
huawei | s3300 | - | |
huawei | s2300_firmware | v100r006c00spc800 | |
huawei | s2300_firmware | v100r006c01spc100 | |
huawei | s2300_firmware | v100r006c03 | |
huawei | s2300 | - | |
huawei | s5300_firmware | v100r006c00spc800 | |
huawei | s5300_firmware | v100r006c01spc100 | |
huawei | s5300_firmware | v100r006c03 | |
huawei | s5300 | - | |
huawei | s6300_firmware | v100r006c00spc800 | |
huawei | s6300_firmware | v100r006c01spc100 | |
huawei | s6300_firmware | v100r006c03 | |
huawei | s6300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v100r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "771FA881-8B73-4923-883E-6FB66DC5785B", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v100r006c00spc800:*:*:*:*:*:*:*", "matchCriteriaId": "FFDF8C50-BB1B-494F-A66C-6AA43829A1F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c00spc800:*:*:*:*:*:*:*", "matchCriteriaId": "C32CA848-E4C4-4F45-B770-B0F56B1D803C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c01spc100:*:*:*:*:*:*:*", "matchCriteriaId": "01778409-3E0D-457D-A3A8-7D547B154EF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "8C328054-3E5C-4122-AD5B-49A71791D7F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c00spc800:*:*:*:*:*:*:*", "matchCriteriaId": "D9B1ABFF-8054-47E2-A122-BBA45915EC4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c01spc100:*:*:*:*:*:*:*", "matchCriteriaId": "6CBBAFAE-0988-4FB5-985F-D9F26F8FB590", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "FEFF6D05-BC82-4943-9D79-95CBEDD5CD2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v100r006c00spc800:*:*:*:*:*:*:*", "matchCriteriaId": "C23B78BC-958A-4F7B-AC41-8F92573CD050", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v100r006c01spc100:*:*:*:*:*:*:*", "matchCriteriaId": "7F131E90-5381-4CC4-B98C-F127A7C9B24E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "554D3674-06D0-4B04-9014-F4A5178785DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v100r006c00spc800:*:*:*:*:*:*:*", "matchCriteriaId": "59483B72-F057-4274-8C88-FF908AB44F5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v100r006c01spc100:*:*:*:*:*:*:*", "matchCriteriaId": "073D332C-3532-4F1E-9885-B5EBFAD04D9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "3F133779-0AA7-468B-9470-075091872D5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches." }, { "lang": "es", "value": "Huawei S9300 con software en versiones anteriores a V100R006SPH013 y S2300,S3300,S5300,S6300 con software en versiones anteriores a V100R006SPH010 soporte Y.1731 y por lo tanto tener la vulnerabilidad Y.1731 en el procesamiento de paquetes especiales. Ta vulnerabilidad provoca el reinicio de los switches." } ], "id": "CVE-2014-3223", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-02T20:59:00.237", "references": [ { "source": "psirt@huawei.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-329625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-329625" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-19" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2015-3913 (GCVE-0-2015-3913)
Vulnerability from cvelistv5
Published
2017-06-08 21:00
Modified
2024-08-06 05:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:56:16.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-08T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3913", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm", "refsource": "CONFIRM", "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3913", "datePublished": "2017-06-08T21:00:00", "dateReserved": "2015-05-12T00:00:00", "dateUpdated": "2024-08-06T05:56:16.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-8677 (GCVE-0-2015-8677)
Vulnerability from cvelistv5
Published
2016-04-14 15:00
Modified
2024-08-06 08:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:29:20.208Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-04-14T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8677", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8677", "datePublished": "2016-04-14T15:00:00", "dateReserved": "2015-12-25T00:00:00", "dateUpdated": "2024-08-06T08:29:20.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-5394 (GCVE-0-2014-5394)
Vulnerability from cvelistv5
Published
2018-01-08 19:00
Modified
2024-08-06 11:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:41:49.182Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "69302", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69302" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701" }, { "name": "campusswitch-cve20145394-info-disc(97763)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-08T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "69302", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69302" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701" }, { "name": "campusswitch-cve20145394-info-disc(97763)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-5394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "69302", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69302" }, { "name": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701", "refsource": "CONFIRM", "url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701" }, { "name": "campusswitch-cve20145394-info-disc(97763)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-5394", "datePublished": "2018-01-08T19:00:00", "dateReserved": "2014-08-22T00:00:00", "dateUpdated": "2024-08-06T11:41:49.182Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-6570 (GCVE-0-2012-6570)
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-09-16 23:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:01.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-20T15:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6570", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-6570", "datePublished": "2013-06-20T15:00:00Z", "dateReserved": "2013-06-20T00:00:00Z", "dateUpdated": "2024-09-16T23:46:14.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-3223 (GCVE-0-2014-3223)
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 10:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Y.1731
Summary
Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03 |
Version: S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:35:56.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-329625" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03", "vendor": "n/a", "versions": [ { "status": "affected", "version": "S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03" } ] } ], "datePublic": "2017-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches." } ], "problemTypes": [ { "descriptions": [ { "description": "Y.1731", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-02T19:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-329625" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2014-3223", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03", "version": { "version_data": [ { "version_value": "S9300,S2300,S3300,S5300,S6300 S9300 with software V100R006C00SPC500??S9300 with software V100R006C00SPC800,S2300,S3300,S5300,S6300 with software V100R006C00SPC800,V100R006C01SPC100, V100R006C03" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Y.1731" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/hw-329625", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/hw-329625" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2014-3223", "datePublished": "2017-04-02T20:00:00", "dateReserved": "2014-05-05T00:00:00", "dateUpdated": "2024-08-06T10:35:56.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-2712 (GCVE-0-2017-2712)
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-16 17:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- EFM Flapping
Summary
S3300 V100R006C05 have an Ethernet in the First Mile (EFM) flapping vulnerability due to the lack of type-length-value (TLV) consistency check. An attacker may craft malformed packets and send them to a device to cause EFM flapping.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | S3300 |
Version: V100R006C05 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:02:07.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "95662", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/95662" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170118-01-vrp-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "S3300", "vendor": "Huawei Technologies Co., Ltd.", "versions": [ { "status": "affected", "version": "V100R006C05" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "S3300 V100R006C05 have an Ethernet in the First Mile (EFM) flapping vulnerability due to the lack of type-length-value (TLV) consistency check. An attacker may craft malformed packets and send them to a device to cause EFM flapping." } ], "problemTypes": [ { "descriptions": [ { "description": "EFM Flapping", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-23T10:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "name": "95662", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/95662" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170118-01-vrp-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "DATE_PUBLIC": "2017-11-15T00:00:00", "ID": "CVE-2017-2712", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "S3300", "version": { "version_data": [ { "version_value": "V100R006C05" } ] } } ] }, "vendor_name": "Huawei Technologies Co., Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "S3300 V100R006C05 have an Ethernet in the First Mile (EFM) flapping vulnerability due to the lack of type-length-value (TLV) consistency check. An attacker may craft malformed packets and send them to a device to cause EFM flapping." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "EFM Flapping" } ] } ] }, "references": { "reference_data": [ { "name": "95662", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95662" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170118-01-vrp-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170118-01-vrp-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2017-2712", "datePublished": "2017-11-22T19:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-16T17:18:28.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-6569 (GCVE-0-2012-6569)
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-09-17 02:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:01.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-20T15:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6569", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-6569", "datePublished": "2013-06-20T15:00:00Z", "dateReserved": "2013-06-20T00:00:00Z", "dateUpdated": "2024-09-17T02:36:51.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-6571 (GCVE-0-2012-6571)
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-09-16 21:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:01.850Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-20T15:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6571", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-6571", "datePublished": "2013-06-20T15:00:00Z", "dateReserved": "2013-06-20T00:00:00Z", "dateUpdated": "2024-09-16T21:08:50.739Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-8572 (GCVE-0-2014-8572)
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 13:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- SSH Denial of Service
Summary
Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions, |
Version: AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions, |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:18:48.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,", "vendor": "n/a", "versions": [ { "status": "affected", "version": "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions," } ] } ], "datePublic": "2017-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "SSH Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-02T19:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2014-8572", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,", "version": { "version_data": [ { "version_value": "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions," } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "SSH Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/hw-373182", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2014-8572", "datePublished": "2017-04-02T20:00:00", "dateReserved": "2014-10-31T00:00:00", "dateUpdated": "2024-08-06T13:18:48.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-8676 (GCVE-0-2015-8676)
Vulnerability from cvelistv5
Published
2016-04-14 15:00
Modified
2024-08-06 08:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:29:20.209Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-04-14T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8676", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8676", "datePublished": "2016-04-14T15:00:00", "dateReserved": "2015-12-25T00:00:00", "dateUpdated": "2024-08-06T08:29:20.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4960 (GCVE-0-2012-4960)
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-08-06 20:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:50:18.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#948096", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/948096" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-22T09:00:00", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#948096", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/948096" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-4960", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#948096", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/948096" }, { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-4960", "datePublished": "2013-06-20T15:00:00", "dateReserved": "2012-09-17T00:00:00", "dateUpdated": "2024-08-06T20:50:18.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }