Vulnerabilites related to huawei - s3300hi
Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI.
Impacted products
Vendor Product Version
huawei ar_18-1x *
huawei ar_18-2x *
huawei ar_18-3x *
huawei ar_19\/29\/49 *
huawei ar_28\/46 *
huawei s2000 r6305
huawei s2300 r6305
huawei s2700 r6305
huawei s3000 r6305
huawei s3300 r6305
huawei s3300hi r6305
huawei s3500 r6305
huawei s3700 r6305
huawei s3900 r6305
huawei s5100 r6305
huawei s5600 r6305
huawei s7800 r6305
huawei s8500 r1631
huawei s8500 r1632



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C169428A-DBA2-4AD4-AB2F-9B55F406D5F5",
              "versionEndIncluding": "r0130",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F96CD3E2-2AE8-48B2-9979-84AD3C99933E",
              "versionEndIncluding": "r1712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A93A0EF1-FDC5-4E7C-A692-C664552913EF",
              "versionEndIncluding": "r0118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9",
              "versionEndIncluding": "r2207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A520A0A9-2BF8-4E32-9194-3307CE52C2AD",
              "versionEndIncluding": "r0311",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF996D4-838E-4295-B8E2-43512DC9BF41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "6185A1C4-34B8-4FED-8144-15EA8012CA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B54F7F-0B13-4ADC-B8F5-72606273528E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC5B0CA-8081-4492-8D2A-5FEE778C5E82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "708E992F-581F-4DA0-A490-BB6E2BA8B598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C8FA59E-F894-441D-8FBA-5D865BD3DFC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "945EEE2E-C21E-4E1D-9D91-F5B0A77C7CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E4AE20-F5FB-47DF-817E-DF7871121CA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "394161B5-65DF-4921-AE2B-0959322A71F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "F02BD40C-8825-46ED-9C99-A4DD5331F04A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BCCDFB-27DB-439B-965C-525941118C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3232F7-23AC-4773-A67D-BCA0A886FE3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D4B69FE-DC23-4A78-9D1A-C35EA98CB1FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*",
              "matchCriteriaId": "008D26B5-DC98-4592-B592-3728C8A0D6C0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en el m\u00f3dulo HTTP en el (1) Branch Intelligent Management System (BIMS) y (2) en el componente de gesti\u00f3n web en Huawei AR routers y switches S2000, S3000, S3500, S3900, S5100, S5600, S7800, y S8500 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante una URI de gran longitud."
    }
  ],
  "id": "CVE-2012-6569",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-06-20T15:55:00.950",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Impacted products
Vendor Product Version
huawei acu v100r003c01spc100
huawei acu v200r001c00
huawei acu v200r001c00spc100
huawei ar_19\/29\/49 *
huawei ar_g3 v200r001c00
huawei ar_g3 v200r001c01
huawei ar_g3 v200r002c00spc200
huawei atn v200r001c00
huawei atn v200r001c01
huawei cx200 v100r005
huawei cx300 v100r005
huawei cx600 v200r002
huawei cx600 v600r001
huawei cx600 v600r002
huawei cx600 v600r003
huawei e200_usg2200 *
huawei e200_usg5100 *
huawei e200e-b *
huawei e200e-c *
huawei e200e-usg2100 *
huawei e200e-x1 *
huawei e200e-x2 *
huawei e200x3 *
huawei e200x5 *
huawei e200x7 *
huawei eudemon_8080e *
huawei eudemon_8160e *
huawei eudemon_usg5300 *
huawei eudemon_usg5500 *
huawei eudemon_usg9300 *
huawei eudemon_usg9500 *
huawei eudemon1000 *
huawei eudemon1000e-u *
huawei eudemon1000e-x *
huawei eudemon100e v200r007
huawei eudemon200 v200r001
huawei eudemon300 *
huawei eudemon500 *
huawei eudemon8000e-x *
huawei h3c_ar\(oem_in\) *
huawei ma5200g v200r003
huawei ma5200g v300r003
huawei me60 v100r005
huawei me60 v100r006
huawei me60 v600r002
huawei me60 v600r003
huawei me60 v600r005c00spc600
huawei ne20 v200r005
huawei ne20e-x6 v300r005
huawei ne40 v300r005
huawei ne40e v300r005
huawei ne40e v600r001
huawei ne40e\/80e v600r002
huawei ne40e\/80e v600r003
huawei ne5000e v300r007
huawei ne5000e v800r002
huawei ne80 v300r005
huawei ne80e v600r001
huawei ne80e v600r002
huawei ne80e v600r003
huawei nip100 v100r001
huawei nip1000 v100r001
huawei nip200 v100r001
huawei nip2100 v100r001c00
huawei nip2200 v100r001c00
huawei nip5100 v100r001c00
huawei s2300 v100r002
huawei s2300 v100r003
huawei s2300 v100r005
huawei s2300 v100r006
huawei s2700 v100r006
huawei s3300 v100r002
huawei s3300 v100r003
huawei s3300 v100r005
huawei s3300 v100r006
huawei s3300hi v100r006
huawei s3300hi v200r001
huawei s3700 v100r005
huawei s3700 v100r006
huawei s3700 v200r001
huawei s5300 v100r002
huawei s5300 v100r003
huawei s5300 v100r005
huawei s5300 v100r006
huawei s5300hi v100r006
huawei s5300hi v200r001
huawei s5306 v100r006
huawei s5306 v200r001
huawei s5700 v100r005
huawei s5700 v100r006
huawei s5700 v200r001
huawei s6300 v100r006
huawei s6300 v200r001
huawei s6700 v100r006
huawei s6700 v200r001
huawei s7700 v100r003
huawei s7700 v100r006
huawei s9300 v100r001
huawei s9300 v100r002
huawei s9300 v100r003
huawei s9300 v100r006
huawei svn2000 v200r001c00
huawei svn3000 v100r002c02spc802b041
huawei svn5000 v200r001c00
huawei svn5300 v100r001c01b019
huawei wlan_ac_6605 v200r001c00
huawei wlan_ac_6605 v200r001c00spc100



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE81EA02-600F-42CE-92C8-7E1D127E9B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A906E7E-7A10-474B-91C4-A30F7FAF55D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5D1A17D-1CDD-4539-897E-A6067EAD1EE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9",
              "versionEndIncluding": "r2207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B19CE2AB-251D-478A-913C-65B5E0BBA0B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "18BA268A-EF28-477C-AC24-38E322FFE553",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "554B2AC0-F4C6-4805-BB39-642D6D292A97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BB1A47C-FB4F-4EF8-A614-95F3B2E6065D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26B81D9-0A62-4F6E-A9A4-5B22F08E0882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24ECC75-1032-4DFD-A0C3-315ABB68C50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F9BA9C4-65A8-4D9D-A21C-CEB53DB2E513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "D71F25CF-F4DE-4FC5-82E9-179CFFA4CA61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D94D86A-C025-4A96-A700-D676B90CBBF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F61F187-74C5-4C50-9F91-6303C87582B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB2B2269-0784-4DE2-B48A-9A36F9B30F96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9151ED5E-04DD-4221-9669-C8112168A507",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63E41F8-8408-4E7A-A423-ACC2C44B3141",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8235FC6D-220F-4F75-BDD2-77FA661F33A2",
              "versionEndIncluding": "v100r005c01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FF6514-05AF-4D86-9B10-B50BC8D0622D",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D14FD9A2-90D5-493C-9BC7-095EBD644114",
              "versionEndIncluding": "v100r005c01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B60ADA-D40C-48C5-A237-DEE5DD372933",
              "versionEndIncluding": "v100r005c01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3502D88-6168-41E3-8641-4045C9EA9B90",
              "versionEndIncluding": "v100r005c01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6DBFF5-0B0B-4F0D-96A1-D2D487AE57C7",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF99475-D5A4-407E-8A7F-D6642186E5B6",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D68DD7D-29F9-460E-9D9C-A70F0DD489B1",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5A801B9-7BB4-4E06-8ED2-D9EF565F313E",
              "versionEndIncluding": "v100r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9D04EF-A73F-4BF6-AB34-3C489156BBD3",
              "versionEndIncluding": "v100r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3510EF8C-F3EB-4531-A0A8-8E0734652E26",
              "versionEndIncluding": "v200r001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08A74A7-65FC-424C-ACAD-B6A6ED27FF60",
              "versionEndIncluding": "v200r002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "788B8EBF-16FA-4FDD-B07A-5A4F6E6B310A",
              "versionEndIncluding": "v100r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C625CA3-BD79-42E8-91B4-539E90FBF0C5",
              "versionEndIncluding": "v200r001c00spc600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF18B94-150C-413F-B6D4-47B5E05DF4BA",
              "versionEndIncluding": "v200r006c02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB0AFBD-5F0E-494A-A752-9EE2F81DF2C5",
              "versionEndIncluding": "v200r001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D8297A-362B-4056-A94F-9D49FF0B56B7",
              "versionEndIncluding": "v200r002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*",
              "matchCriteriaId": "956ED431-6CE1-4873-BDC3-7832F5867C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "5679FA9F-B4E5-42A9-9B9A-3601BE785CC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "014E4B7B-E107-40B6-9B18-F5610959EA8B",
              "versionEndIncluding": "v200r006c02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA4ACA-0104-4A93-9FBC-DC0496A1EB70",
              "versionEndIncluding": "v200r006c02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B686C4E-FD19-42B0-87A5-162D72C47BE0",
              "versionEndIncluding": "v200r001c00spc600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBDEE398-3BC9-4855-952F-44B37BF9F478",
              "versionEndIncluding": "r2209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D17E429-865D-4677-872E-1E191BB0A6DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD2ADD48-FBB4-4E65-8486-757D2ADA4DA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AF75F78-2B91-47C3-B5AE-F4C9769B5AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "18496123-2B0E-46D1-88F6-85897B2B65B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0045741-3B14-435E-8B12-B536751DD24F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE8094F7-FAB2-4624-B2ED-467B40ADA260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BC19826-AC6E-4DE1-95CA-49D4BB6F6644",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "49D7692F-6EA0-4A5E-B841-2B49332FCC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "C555EAC5-1E45-4BE5-8C69-DB1916A2EBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF2311E-D7DE-4C7C-BD88-4B947BD4F8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "B23A5D99-8458-4285-ABF8-FA0D2F49B811",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "5348DF82-072D-4B3B-9919-B5478420A98F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "54C3C26D-0FD0-48B9-A168-E9C6605DCB0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D4D3971-B2DA-44EC-97A1-CFF436BF44F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA4A9B6-378D-4F4B-B88D-C13859E6236B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF6322F0-0749-4C3D-9144-D92A64B9D5FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "74801C9A-31D1-4E74-9211-9AB67B5FEAB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2D277B-08F0-4F6A-BC99-FBBCA4F5207D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "A81A4563-15DC-4125-9E3D-5B9FB0360EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "449449A2-28B2-4A9A-A2C9-84A18596AEDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE4E8E1-AF7C-49E9-9758-887EFD8CB8F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "90FF10E6-4080-4186-83DE-37703A468F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B0009DF-D44E-4D96-909F-B911D7BA127B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8CE9794-9A67-4F65-A81A-EE00AE714A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3DC0192-8E8B-4E0C-A91C-92094A167878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9317FE4B-95F0-4615-9FA1-683D644BC3E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "871BB53D-F86F-4E3D-8DF7-875C8C1C7FDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E655344-8341-4FFA-BBED-F5D5A15759D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "662EDAE9-2B0F-4774-8790-2C62997764FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "22621191-B2CD-4BA9-B6F1-8D59850604A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "142335E6-A4F5-4CC4-8D86-835C3E0E5211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF7B5B70-1540-490F-8486-31639DB54F12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "33864641-EB9A-4CCC-9057-26D22AD839BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "59AD4C23-6315-4B97-85BB-1074F36F7291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "972BB8A0-27D8-4A0A-865E-57E37F70A484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "41435CB4-537C-45DC-B8DB-0C1F38F1D222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5FE313-7374-4D7A-9A01-F389311710C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EF096DC-B6F4-4763-AC6B-72CB46AB1976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1171FC3-5A2E-40C6-85FF-AF7E78F96C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "A706C2B0-5E15-4C90-910F-0ABB65573C93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "2295584A-2664-45AE-BA0C-1B0411F29A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDA542A3-7BB3-42B6-ACBB-D00AD4AD707A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "5361C4C5-BBC5-42FE-A575-985B57EF575E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "75A90C9F-8DAE-45B4-BB78-6080A434E5FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "175A8714-CD80-472B-9507-829EBC59B805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "81195EA9-D62B-492D-AA37-EF7AD17AED7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "47052A6F-E532-42B6-9B4B-46424A1F6377",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B22E5AB-DAF6-4020-A62E-BE6FBE57D3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C178B6F-8608-4BBE-A8D8-8798FB1D75E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CAD535-0216-4048-BFDA-863AA5425BA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "9424F3B6-A280-4043-A670-3768D9515631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FB869CD-37F8-4E77-8065-B9C8FADED40C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "C22B5DE3-03ED-4ED4-BD86-278197FA3FC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "652F2CCF-41FE-4DEC-8179-FF285AB99E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "66149AA8-E897-4563-97EC-C5EDCDBE072B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B3F7637-0B4C-40D0-B814-B19F10118795",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "04686A95-05CF-4ACC-89E5-2140DFC423F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "63BB797D-2C82-4A55-A26A-61A6C1C86888",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "465F6E51-0676-4443-9122-CB2AD59C7516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "94970073-415B-4358-833F-CC220653376D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "F26E31D2-31F8-4D4F-AD3A-44C59B22B121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "59513736-11B7-47E6-B5C4-D33F9E032BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*",
              "matchCriteriaId": "931A86E3-43C1-4C72-8425-862C33A2DBA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "15EBA968-C3E0-430E-944D-B4DA30B932C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*",
              "matchCriteriaId": "17A15567-DC96-4513-8681-93CE26B4FA07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1968B0D3-1653-459A-865D-79DBB9AADEE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "7490231F-7FAB-4875-812F-657B7BF4F136",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
    },
    {
      "lang": "es",
      "value": "Los Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, y NIP5100 utiliza el algoritmo DES para las contrase\u00f1as almacenados, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes dependientes de contexto obtener contrase\u00f1as de texto simple a trav\u00e9s de un ataque de fuerza bruta."
    }
  ],
  "id": "CVE-2012-4960",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-06-20T15:55:00.897",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/948096"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/948096"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack.
Impacted products
Vendor Product Version
huawei ar_18-1x *
huawei ar_18-2x *
huawei ar_18-3x *
huawei ar_19\/29\/49 *
huawei ar_28\/46 *
huawei s2000 r6305
huawei s2300 r6305
huawei s2700 r6305
huawei s3000 r6305
huawei s3300 r6305
huawei s3300hi r6305
huawei s3500 r6305
huawei s3700 r6305
huawei s3900 r6305
huawei s5100 r6305
huawei s5600 r6305
huawei s7800 r6305
huawei s8500 r1631
huawei s8500 r1632



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C169428A-DBA2-4AD4-AB2F-9B55F406D5F5",
              "versionEndIncluding": "r0130",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F96CD3E2-2AE8-48B2-9979-84AD3C99933E",
              "versionEndIncluding": "r1712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A93A0EF1-FDC5-4E7C-A692-C664552913EF",
              "versionEndIncluding": "r0118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9",
              "versionEndIncluding": "r2207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A520A0A9-2BF8-4E32-9194-3307CE52C2AD",
              "versionEndIncluding": "r0311",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF996D4-838E-4295-B8E2-43512DC9BF41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "6185A1C4-34B8-4FED-8144-15EA8012CA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B54F7F-0B13-4ADC-B8F5-72606273528E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC5B0CA-8081-4492-8D2A-5FEE778C5E82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "708E992F-581F-4DA0-A490-BB6E2BA8B598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C8FA59E-F894-441D-8FBA-5D865BD3DFC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "945EEE2E-C21E-4E1D-9D91-F5B0A77C7CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E4AE20-F5FB-47DF-817E-DF7871121CA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "394161B5-65DF-4921-AE2B-0959322A71F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "F02BD40C-8825-46ED-9C99-A4DD5331F04A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BCCDFB-27DB-439B-965C-525941118C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3232F7-23AC-4773-A67D-BCA0A886FE3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D4B69FE-DC23-4A78-9D1A-C35EA98CB1FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*",
              "matchCriteriaId": "008D26B5-DC98-4592-B592-3728C8A0D6C0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo HTTP en el (1) Branch Intelligent Management System (BIMS) y (2) gesti\u00f3n web de componentes para switches Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 usa valores de Session ID predecibles lo que hace m\u00e1s f\u00e1cil a atacantes remotos secuestrar la sesi\u00f3n a trav\u00e9s de ataques de fuerza bruta."
    }
  ],
  "id": "CVE-2012-6571",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-06-20T15:55:00.983",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response.
Impacted products
Vendor Product Version
huawei ar_18-1x *
huawei ar_18-2x *
huawei ar_18-3x *
huawei ar_19\/29\/49 *
huawei ar_28\/46 *
huawei s2000 r6305
huawei s2300 r6305
huawei s2700 r6305
huawei s3000 r6305
huawei s3300 r6305
huawei s3300hi r6305
huawei s3500 r6305
huawei s3700 r6305
huawei s3900 r6305
huawei s5100 r6305
huawei s5600 r6305
huawei s7800 r6305
huawei s8500 r1631
huawei s8500 r1632



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C169428A-DBA2-4AD4-AB2F-9B55F406D5F5",
              "versionEndIncluding": "r0130",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F96CD3E2-2AE8-48B2-9979-84AD3C99933E",
              "versionEndIncluding": "r1712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A93A0EF1-FDC5-4E7C-A692-C664552913EF",
              "versionEndIncluding": "r0118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9",
              "versionEndIncluding": "r2207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A520A0A9-2BF8-4E32-9194-3307CE52C2AD",
              "versionEndIncluding": "r0311",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF996D4-838E-4295-B8E2-43512DC9BF41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "6185A1C4-34B8-4FED-8144-15EA8012CA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B54F7F-0B13-4ADC-B8F5-72606273528E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC5B0CA-8081-4492-8D2A-5FEE778C5E82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "708E992F-581F-4DA0-A490-BB6E2BA8B598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C8FA59E-F894-441D-8FBA-5D865BD3DFC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "945EEE2E-C21E-4E1D-9D91-F5B0A77C7CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E4AE20-F5FB-47DF-817E-DF7871121CA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "394161B5-65DF-4921-AE2B-0959322A71F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "F02BD40C-8825-46ED-9C99-A4DD5331F04A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "47BCCDFB-27DB-439B-965C-525941118C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3232F7-23AC-4773-A67D-BCA0A886FE3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D4B69FE-DC23-4A78-9D1A-C35EA98CB1FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*",
              "matchCriteriaId": "008D26B5-DC98-4592-B592-3728C8A0D6C0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo HTTP en (1) Branch Intelligent Management System (BIMS) y (2) componentes de gesti\u00f3n web de switches de Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, y S8500 no comprueba si los datos HTTP son mayores que el valor del campo Content-Length, que permite a los servidores HTTP remotos realizar ataques de desbordamiento de b\u00fafer basado en mont\u00edculo y ejecutar c\u00f3digo arbitrario a trav\u00e9s de una respuesta elaborada."
    }
  ],
  "id": "CVE-2012-6570",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-06-20T15:55:00.967",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2025-04-20 01:37
Summary
Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow.
Impacted products
Vendor Product Version
huawei campus_s3700hi_firmware v200r001c00spc300
huawei campus_s3700hi -
huawei s5700_firmware v200r001c00spc300
huawei s5700 -
huawei s6700_firmware v200r001c00spc300
huawei s6700 -
huawei s3300hi_firmware v200r001c00spc300
huawei s3300hi -
huawei s5300_firmware v200r001c00spc300
huawei s5300 -
huawei s6300_firmware v200r001c00spc300
huawei s6300 -
huawei s9300_firmware v200r001c00spc300
huawei s9300 -
huawei s7700_firmware v200r001c00spc300
huawei s7700 -
huawei lsw_s9700_firmware v200r001c00spc300
huawei lsw_s9700 -
huawei campus_s5700_firmware v200r002c00spc100
huawei campus_s5700 -
huawei s6700_firmware v200r002c00spc100
huawei s6700 -
huawei s5300_firmware v200r002c00spc100
huawei s5300 -
huawei s6300_firmware v200r002c00spc100
huawei s6300 -
huawei campus_s7700_firmware v200r003c00spc300
huawei campus_s7700 -
huawei s9300_firmware v200r003c00spc300
huawei s9300 -
huawei s9300e_firmware v200r003c00spc300
huawei s9300e -
huawei s5300_firmware v200r003c00spc300
huawei s5300 -
huawei s5700_firmware v200r003c00spc300
huawei s5700 -
huawei s6300_firmware v200r003c00spc300
huawei s6300 -
huawei s6700_firmware v200r003c00spc300
huawei s6700 -
huawei s2350_firmware v200r003c00spc300
huawei s2350 -
huawei s2750_firmware v200r003c00spc300
huawei s2750 -
huawei lsw_s9700_firmware v200r003c00spc300
huawei lsw_s9700 -
huawei campus_s7700_firmware v200r003c00spc500
huawei campus_s7700 -
huawei s9300_firmware v200r003c00spc500
huawei s9300 -
huawei s9300e_firmware v200r003c00spc500
huawei s9300e -
huawei lsw_s9700_firmware v200r003c00spc500
huawei lsw_s9700 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:campus_s3700hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4C69CF3-CC8C-46BE-974C-6AD204023E67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:campus_s3700hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B77C6A1-0964-443D-A75D-0E68A59F919B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "121BEE57-945E-4368-8AE4-4A823D70D31C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF84CB7-7EC9-4978-A4F6-FD5746AF1CE9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA7AC10D-B0DD-4206-8642-134DDD585C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s3300hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "361EBDA2-3656-4D57-ABE1-37C6C0FFDC34",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s3300hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "080BC2E6-7EEC-450E-BAF0-3DB7B342329A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "93E7A87E-E2FB-4852-9BE5-164822801822",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "7082EE3F-3174-42C2-B010-5078DC752D67",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D1EF10E-F18B-4F3A-AA2B-25003183E19D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "07A44DEA-AB17-48F4-87C1-B3B6088BCD82",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFA6C99-8A84-4E8F-9DBC-A3822B02B2F7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:lsw_s9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F0D98A-0118-4F77-96D9-57A3F343FB4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:campus_s5700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA616684-1DDC-4A23-97B0-518EAD07D2A2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:campus_s5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F29515E-98DD-496F-B3FC-176CD4B2BD9E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFFF09EB-AA08-4204-B028-182933EC9700",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA7AC10D-B0DD-4206-8642-134DDD585C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "647A8737-10F5-4008-8F68-BF8BE4319C56",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "58578CA3-392E-4E6D-9B93-E57DC4F44237",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:campus_s7700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "F12DF054-43B5-42DC-8FDF-664354091ABA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:campus_s7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C949558A-3AAC-4A2A-81C1-B9D7072FF3FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "613A5720-C4AC-448E-9170-A113328B4DBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "11DA3DAE-870F-4F61-9D6B-3FB7D1F49D82",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B913A258-48B6-45D0-A37B-2C665DCA735C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D07FB95-7CE7-480A-BF2D-87017EFAE038",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEC329F7-D83F-4119-B8CA-CC819EC872CB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CB0108A-2462-45D6-8A82-8681E8167D6C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D5033F0-7E4F-431A-B4EA-E5D5D1FCFE5E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA7AC10D-B0DD-4206-8642-134DDD585C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s2350_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E60C34-3553-4374-A7B6-CFA92BC19CDA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2AB6207-F2BC-47A9-980C-62463157A56A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s2750_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C8196A-21F2-4903-B5B6-B6C9F42B1051",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7859972-B7B8-4619-AAED-22B6B14852BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r003c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2EFAF03-1F00-46A8-B5BE-2AE05BFA3B33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:lsw_s9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F0D98A-0118-4F77-96D9-57A3F343FB4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:campus_s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7295127-4B3D-44E8-9513-EC2DE1B37479",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:campus_s7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C949558A-3AAC-4A2A-81C1-B9D7072FF3FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "78DA2DC7-63B3-40D7-BEC7-AF81066A2733",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5752E4C-4B7D-4139-BCAE-7F52D4A235F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B913A258-48B6-45D0-A37B-2C665DCA735C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C81F30C-4A04-4376-8AA6-E01B76DF2B20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:lsw_s9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F0D98A-0118-4F77-96D9-57A3F343FB4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow."
    },
    {
      "lang": "es",
      "value": "Huawei Campus S3700HI con software V200R001C00SPC300; Campus S5700 con software V200R002C00SPC100; Campus S7700 con software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 con software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 con software V200R003C00SPC300; S2750 con software V200R003C00SPC300; S5300 con software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 con software V200R001C00SPC300,V200R003C00SPC300; S6300 con software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI con software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 con software V200R001C00SPC300; S9300 con software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E con software V200R003C00SPC300,V200R003C00SPC500 permiten a atacantes seguir enviando paquetes mal formado para provocar un ataque de denegaci\u00f3n de servicio (DoS), tambi\u00e9n conocido como desbordamiento de memoria din\u00e1mica."
    }
  ],
  "id": "CVE-2014-4706",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-04-02T20:59:00.280",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/hw-343218"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/hw-343218"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2014-4706 (GCVE-0-2014-4706)
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 11:27
Severity ?
CWE
  • Heap Overflow
Summary
Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow.
References
Impacted products
Vendor Product Version
n/a Campus S3700HI, S5700, S6700 S3300HI, S5300, S6300, S9300, S7700,LSW S9700,Campus S5700, S6700,Campus S7700, S9300E, S2350, S2750,S9300,S9300E, Campus S3700HI with software V200R001C00SPC300,Campus S5700 with software V200R002C00SPC100,Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500,LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S2350 with software V200R003C00SPC300,S2750 with software V200R003C00SPC300,S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S5700 with software V200R001C00SPC300,V200R003C00SPC300,S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S7700 with software V200R001C00SPC300,S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S9300E with software V200R003C00SPC300,V200R003C00SPC500, Version: Campus S3700HI, S5700, S6700 S3300HI, S5300, S6300, S9300, S7700,LSW S9700,Campus S5700, S6700,Campus S7700, S9300E, S2350, S2750,S9300,S9300E, Campus S3700HI with software V200R001C00SPC300,Campus S5700 with software V200R002C00SPC100,Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500,LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S2350 with software V200R003C00SPC300,S2750 with software V200R003C00SPC300,S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S5700 with software V200R001C00SPC300,V200R003C00SPC300,S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S7700 with software V200R001C00SPC300,S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S9300E with software V200R003C00SPC300,V200R003C00SPC500,
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T11:27:36.889Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/hw-343218"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Campus S3700HI, S5700, S6700 S3300HI, S5300, S6300, S9300, S7700,LSW S9700,Campus S5700, S6700,Campus S7700, S9300E, S2350, S2750,S9300,S9300E, Campus S3700HI with software V200R001C00SPC300,Campus S5700 with software V200R002C00SPC100,Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500,LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S2350 with software V200R003C00SPC300,S2750 with software V200R003C00SPC300,S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S5700 with software V200R001C00SPC300,V200R003C00SPC300,S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S7700 with software V200R001C00SPC300,S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S9300E with software V200R003C00SPC300,V200R003C00SPC500,",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Campus S3700HI, S5700, S6700 S3300HI, S5300, S6300, S9300, S7700,LSW S9700,Campus S5700, S6700,Campus S7700, S9300E, S2350, S2750,S9300,S9300E, Campus S3700HI with software V200R001C00SPC300,Campus S5700 with software V200R002C00SPC100,Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500,LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S2350 with software V200R003C00SPC300,S2750 with software V200R003C00SPC300,S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S5700 with software V200R001C00SPC300,V200R003C00SPC300,S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S7700 with software V200R001C00SPC300,S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S9300E with software V200R003C00SPC300,V200R003C00SPC500,"
            }
          ]
        }
      ],
      "datePublic": "2017-03-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Heap Overflow",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-04-02T19:57:01",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/hw-343218"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2014-4706",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Campus S3700HI, S5700, S6700 S3300HI, S5300, S6300, S9300, S7700,LSW S9700,Campus S5700, S6700,Campus S7700, S9300E, S2350, S2750,S9300,S9300E, Campus S3700HI with software V200R001C00SPC300,Campus S5700 with software V200R002C00SPC100,Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500,LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S2350 with software V200R003C00SPC300,S2750 with software V200R003C00SPC300,S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S5700 with software V200R001C00SPC300,V200R003C00SPC300,S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S7700 with software V200R001C00SPC300,S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S9300E with software V200R003C00SPC300,V200R003C00SPC500,",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Campus S3700HI, S5700, S6700 S3300HI, S5300, S6300, S9300, S7700,LSW S9700,Campus S5700, S6700,Campus S7700, S9300E, S2350, S2750,S9300,S9300E, Campus S3700HI with software V200R001C00SPC300,Campus S5700 with software V200R002C00SPC100,Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500,LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S2350 with software V200R003C00SPC300,S2750 with software V200R003C00SPC300,S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S5700 with software V200R001C00SPC300,V200R003C00SPC300,S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300,S7700 with software V200R001C00SPC300,S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500,S9300E with software V200R003C00SPC300,V200R003C00SPC500,"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Heap Overflow"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/hw-343218",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/hw-343218"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2014-4706",
    "datePublished": "2017-04-02T20:00:00",
    "dateReserved": "2014-07-01T00:00:00",
    "dateUpdated": "2024-08-06T11:27:36.889Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-6570 (GCVE-0-2012-6570)
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-09-16 23:46
Severity ?
CWE
  • n/a
Summary
The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:36:01.313Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-06-20T15:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-6570",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-6570",
    "datePublished": "2013-06-20T15:00:00Z",
    "dateReserved": "2013-06-20T00:00:00Z",
    "dateUpdated": "2024-09-16T23:46:14.672Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-6569 (GCVE-0-2012-6569)
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-09-17 02:36
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:36:01.340Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-06-20T15:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-6569",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-6569",
    "datePublished": "2013-06-20T15:00:00Z",
    "dateReserved": "2013-06-20T00:00:00Z",
    "dateUpdated": "2024-09-17T02:36:51.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-4960 (GCVE-0-2012-4960)
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-08-06 20:50
Severity ?
CWE
  • n/a
Summary
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:50:18.270Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#948096",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/948096"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-12-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-08-22T09:00:00",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#948096",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/948096"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2012-4960",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#948096",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/948096"
            },
            {
              "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2012-4960",
    "datePublished": "2013-06-20T15:00:00",
    "dateReserved": "2012-09-17T00:00:00",
    "dateUpdated": "2024-08-06T20:50:18.270Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-6571 (GCVE-0-2012-6571)
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-09-16 21:08
Severity ?
CWE
  • n/a
Summary
The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:36:01.850Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-06-20T15:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-6571",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-6571",
    "datePublished": "2013-06-20T15:00:00Z",
    "dateReserved": "2013-06-20T00:00:00Z",
    "dateUpdated": "2024-09-16T21:08:50.739Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}