fkie_cve-2015-8085
Vulnerability from fkie_nvd
Published
2016-10-03 21:59
Modified
2025-04-12 10:46
Summary
Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm.
Impacted products
Vendor Product Version
huawei s9300_firmware v200r005c00spc300
huawei s9300_firmware v200r006c00spc500
huawei s9300 -
huawei s12700_firmware v200r005c00
huawei s12700_firmware v200r006c00
huawei s12700 -
huawei quidway_s9300_firmware v200r001c00spc300
huawei quidway_s9300_firmware v200r002c00spc100
huawei quidway_s9300_firmware v200r003c00spc500
huawei quidway_s9300 -
huawei ar_firmware v200r001
huawei ar_firmware v200r002
huawei ar_firmware v200r003
huawei ar_firmware v200r005c10
huawei ar_firmware v200r005c20
huawei ar_firmware v200r005c30
huawei ar -
huawei quidway_s5300_firmware v200r001c00spc300
huawei quidway_s5300 -
huawei s5700_firmware v200r001c00
huawei s5700_firmware v200r002c00
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r006c00
huawei s5700 -
huawei s5300_firmware v200r002c00
huawei s5300_firmware v200r005c00spc500
huawei s5300_firmware v200r006c00spc500
huawei s5300 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "A066F4B8-2258-4ED2-A166-02FCA7C9F3A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDA38762-CACE-403B-8DE5-42E0306FEB28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D81469B-EC6C-493D-B632-4DF821A1F304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "138C1E57-176C-46B1-9704-D9C8391CC802",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB8B2442-4A0E-4C7A-8D21-A1E09BD1A204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r002c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "3022A5BA-DD0D-47D8-8EFA-A617743C133A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:quidway_s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B2FFB6E-1895-4796-B445-4A4193DEFEAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E756FE8-F106-4BFD-B33B-CC198363D2FD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A265FD5-0984-4698-97EB-2904C289561D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFF757E5-F689-49CF-9972-ED5A3D825891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "08EAB0B6-9363-4632-814A-D51DD3087346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r005c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "65081FFE-ECBD-42EE-885A-7E29AB844FBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r005c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "5356CB25-52E6-4786-B024-07F7B53E00A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar_firmware:v200r005c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A40184-F3A0-472C-B4DE-7AD6D73BEA17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1D2EB9C-FA8B-4B3F-89BE-AC2611EE4373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:quidway_s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5B529C9-04F5-48C3-9346-C7E0104ED0C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:quidway_s5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C872196-628D-42A2-AC58-69CD8784CE5D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "336AA440-AEF4-482B-A037-8976DC38BA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4907FBB8-5157-460D-9240-DD7D610C0FCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCF23DAE-1215-41B2-88C5-4436D846266C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5973A534-F961-4A97-B20E-994BA28AFE29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD118E1-317E-4903-A4D0-51EBCFA58C5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r005c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AC26C2F-71A8-433A-B062-789F2E32605C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r006c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "A17ED5D3-1698-4AED-9640-F9CE026AD217",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm."
    },
    {
      "lang": "es",
      "value": "Routers Huawei AR con software en versiones anteriores a V200R007C00SPC100; routers Quidway S9300 con software en versiones anteriores a V200R009C00; routers S12700 con software en versiones anteriores aV200R008C00SPC500; routers S9300, Quidway S5300 y S5300 con software en versiones anteriores aV200R007C00 y routers S5700 con software en versiones anteriores aV200R007C00SPC500 facilita a administradores remotos autenticados obtener y descifrar contrase\u00f1as aprovechando la selecci\u00f3n de un algoritmos de cifrado reversible."
    }
  ],
  "id": "CVE-2015-8085",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-10-03T21:59:03.800",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/76897"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/76897"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-326"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…