Vulnerabilites related to huawei - nip2100
cve-2012-4960
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-08-06 20:50
Severity ?
Summary
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:50:18.270Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#948096",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/948096"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-12-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-08-22T09:00:00",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#948096",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/948096"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2012-4960",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#948096",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/948096"
            },
            {
              "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2012-4960",
    "datePublished": "2013-06-20T15:00:00",
    "dateReserved": "2012-09-17T00:00:00",
    "dateUpdated": "2024-08-06T20:50:18.270Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2024-11-21 01:43
Severity ?
Summary
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Impacted products
Vendor Product Version
huawei acu v100r003c01spc100
huawei acu v200r001c00
huawei acu v200r001c00spc100
huawei ar_19\/29\/49 *
huawei ar_g3 v200r001c00
huawei ar_g3 v200r001c01
huawei ar_g3 v200r002c00spc200
huawei atn v200r001c00
huawei atn v200r001c01
huawei cx200 v100r005
huawei cx300 v100r005
huawei cx600 v200r002
huawei cx600 v600r001
huawei cx600 v600r002
huawei cx600 v600r003
huawei e200_usg2200 *
huawei e200_usg5100 *
huawei e200e-b *
huawei e200e-c *
huawei e200e-usg2100 *
huawei e200e-x1 *
huawei e200e-x2 *
huawei e200x3 *
huawei e200x5 *
huawei e200x7 *
huawei eudemon_8080e *
huawei eudemon_8160e *
huawei eudemon_usg5300 *
huawei eudemon_usg5500 *
huawei eudemon_usg9300 *
huawei eudemon_usg9500 *
huawei eudemon1000 *
huawei eudemon1000e-u *
huawei eudemon1000e-x *
huawei eudemon100e v200r007
huawei eudemon200 v200r001
huawei eudemon300 *
huawei eudemon500 *
huawei eudemon8000e-x *
huawei h3c_ar\(oem_in\) *
huawei ma5200g v200r003
huawei ma5200g v300r003
huawei me60 v100r005
huawei me60 v100r006
huawei me60 v600r002
huawei me60 v600r003
huawei me60 v600r005c00spc600
huawei ne20 v200r005
huawei ne20e-x6 v300r005
huawei ne40 v300r005
huawei ne40e v300r005
huawei ne40e v600r001
huawei ne40e\/80e v600r002
huawei ne40e\/80e v600r003
huawei ne5000e v300r007
huawei ne5000e v800r002
huawei ne80 v300r005
huawei ne80e v600r001
huawei ne80e v600r002
huawei ne80e v600r003
huawei nip100 v100r001
huawei nip1000 v100r001
huawei nip200 v100r001
huawei nip2100 v100r001c00
huawei nip2200 v100r001c00
huawei nip5100 v100r001c00
huawei s2300 v100r002
huawei s2300 v100r003
huawei s2300 v100r005
huawei s2300 v100r006
huawei s2700 v100r006
huawei s3300 v100r002
huawei s3300 v100r003
huawei s3300 v100r005
huawei s3300 v100r006
huawei s3300hi v100r006
huawei s3300hi v200r001
huawei s3700 v100r005
huawei s3700 v100r006
huawei s3700 v200r001
huawei s5300 v100r002
huawei s5300 v100r003
huawei s5300 v100r005
huawei s5300 v100r006
huawei s5300hi v100r006
huawei s5300hi v200r001
huawei s5306 v100r006
huawei s5306 v200r001
huawei s5700 v100r005
huawei s5700 v100r006
huawei s5700 v200r001
huawei s6300 v100r006
huawei s6300 v200r001
huawei s6700 v100r006
huawei s6700 v200r001
huawei s7700 v100r003
huawei s7700 v100r006
huawei s9300 v100r001
huawei s9300 v100r002
huawei s9300 v100r003
huawei s9300 v100r006
huawei svn2000 v200r001c00
huawei svn3000 v100r002c02spc802b041
huawei svn5000 v200r001c00
huawei svn5300 v100r001c01b019
huawei wlan_ac_6605 v200r001c00
huawei wlan_ac_6605 v200r001c00spc100



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE81EA02-600F-42CE-92C8-7E1D127E9B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A906E7E-7A10-474B-91C4-A30F7FAF55D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5D1A17D-1CDD-4539-897E-A6067EAD1EE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9",
              "versionEndIncluding": "r2207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B19CE2AB-251D-478A-913C-65B5E0BBA0B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "18BA268A-EF28-477C-AC24-38E322FFE553",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "554B2AC0-F4C6-4805-BB39-642D6D292A97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BB1A47C-FB4F-4EF8-A614-95F3B2E6065D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26B81D9-0A62-4F6E-A9A4-5B22F08E0882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24ECC75-1032-4DFD-A0C3-315ABB68C50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F9BA9C4-65A8-4D9D-A21C-CEB53DB2E513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "D71F25CF-F4DE-4FC5-82E9-179CFFA4CA61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D94D86A-C025-4A96-A700-D676B90CBBF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F61F187-74C5-4C50-9F91-6303C87582B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB2B2269-0784-4DE2-B48A-9A36F9B30F96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9151ED5E-04DD-4221-9669-C8112168A507",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63E41F8-8408-4E7A-A423-ACC2C44B3141",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8235FC6D-220F-4F75-BDD2-77FA661F33A2",
              "versionEndIncluding": "v100r005c01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FF6514-05AF-4D86-9B10-B50BC8D0622D",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D14FD9A2-90D5-493C-9BC7-095EBD644114",
              "versionEndIncluding": "v100r005c01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B60ADA-D40C-48C5-A237-DEE5DD372933",
              "versionEndIncluding": "v100r005c01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3502D88-6168-41E3-8641-4045C9EA9B90",
              "versionEndIncluding": "v100r005c01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6DBFF5-0B0B-4F0D-96A1-D2D487AE57C7",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF99475-D5A4-407E-8A7F-D6642186E5B6",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D68DD7D-29F9-460E-9D9C-A70F0DD489B1",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5A801B9-7BB4-4E06-8ED2-D9EF565F313E",
              "versionEndIncluding": "v100r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9D04EF-A73F-4BF6-AB34-3C489156BBD3",
              "versionEndIncluding": "v100r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3510EF8C-F3EB-4531-A0A8-8E0734652E26",
              "versionEndIncluding": "v200r001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08A74A7-65FC-424C-ACAD-B6A6ED27FF60",
              "versionEndIncluding": "v200r002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "788B8EBF-16FA-4FDD-B07A-5A4F6E6B310A",
              "versionEndIncluding": "v100r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C625CA3-BD79-42E8-91B4-539E90FBF0C5",
              "versionEndIncluding": "v200r001c00spc600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF18B94-150C-413F-B6D4-47B5E05DF4BA",
              "versionEndIncluding": "v200r006c02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB0AFBD-5F0E-494A-A752-9EE2F81DF2C5",
              "versionEndIncluding": "v200r001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D8297A-362B-4056-A94F-9D49FF0B56B7",
              "versionEndIncluding": "v200r002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*",
              "matchCriteriaId": "956ED431-6CE1-4873-BDC3-7832F5867C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "5679FA9F-B4E5-42A9-9B9A-3601BE785CC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "014E4B7B-E107-40B6-9B18-F5610959EA8B",
              "versionEndIncluding": "v200r006c02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA4ACA-0104-4A93-9FBC-DC0496A1EB70",
              "versionEndIncluding": "v200r006c02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B686C4E-FD19-42B0-87A5-162D72C47BE0",
              "versionEndIncluding": "v200r001c00spc600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBDEE398-3BC9-4855-952F-44B37BF9F478",
              "versionEndIncluding": "r2209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D17E429-865D-4677-872E-1E191BB0A6DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD2ADD48-FBB4-4E65-8486-757D2ADA4DA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AF75F78-2B91-47C3-B5AE-F4C9769B5AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "18496123-2B0E-46D1-88F6-85897B2B65B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0045741-3B14-435E-8B12-B536751DD24F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE8094F7-FAB2-4624-B2ED-467B40ADA260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BC19826-AC6E-4DE1-95CA-49D4BB6F6644",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "49D7692F-6EA0-4A5E-B841-2B49332FCC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "C555EAC5-1E45-4BE5-8C69-DB1916A2EBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF2311E-D7DE-4C7C-BD88-4B947BD4F8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "B23A5D99-8458-4285-ABF8-FA0D2F49B811",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "5348DF82-072D-4B3B-9919-B5478420A98F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "54C3C26D-0FD0-48B9-A168-E9C6605DCB0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D4D3971-B2DA-44EC-97A1-CFF436BF44F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA4A9B6-378D-4F4B-B88D-C13859E6236B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF6322F0-0749-4C3D-9144-D92A64B9D5FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "74801C9A-31D1-4E74-9211-9AB67B5FEAB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2D277B-08F0-4F6A-BC99-FBBCA4F5207D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "A81A4563-15DC-4125-9E3D-5B9FB0360EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "449449A2-28B2-4A9A-A2C9-84A18596AEDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE4E8E1-AF7C-49E9-9758-887EFD8CB8F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "90FF10E6-4080-4186-83DE-37703A468F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B0009DF-D44E-4D96-909F-B911D7BA127B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8CE9794-9A67-4F65-A81A-EE00AE714A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3DC0192-8E8B-4E0C-A91C-92094A167878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9317FE4B-95F0-4615-9FA1-683D644BC3E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "871BB53D-F86F-4E3D-8DF7-875C8C1C7FDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E655344-8341-4FFA-BBED-F5D5A15759D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "662EDAE9-2B0F-4774-8790-2C62997764FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "22621191-B2CD-4BA9-B6F1-8D59850604A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "142335E6-A4F5-4CC4-8D86-835C3E0E5211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF7B5B70-1540-490F-8486-31639DB54F12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "33864641-EB9A-4CCC-9057-26D22AD839BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "59AD4C23-6315-4B97-85BB-1074F36F7291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "972BB8A0-27D8-4A0A-865E-57E37F70A484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "41435CB4-537C-45DC-B8DB-0C1F38F1D222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5FE313-7374-4D7A-9A01-F389311710C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EF096DC-B6F4-4763-AC6B-72CB46AB1976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1171FC3-5A2E-40C6-85FF-AF7E78F96C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "A706C2B0-5E15-4C90-910F-0ABB65573C93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "2295584A-2664-45AE-BA0C-1B0411F29A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDA542A3-7BB3-42B6-ACBB-D00AD4AD707A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "5361C4C5-BBC5-42FE-A575-985B57EF575E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "75A90C9F-8DAE-45B4-BB78-6080A434E5FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "175A8714-CD80-472B-9507-829EBC59B805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "81195EA9-D62B-492D-AA37-EF7AD17AED7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "47052A6F-E532-42B6-9B4B-46424A1F6377",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B22E5AB-DAF6-4020-A62E-BE6FBE57D3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C178B6F-8608-4BBE-A8D8-8798FB1D75E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CAD535-0216-4048-BFDA-863AA5425BA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "9424F3B6-A280-4043-A670-3768D9515631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FB869CD-37F8-4E77-8065-B9C8FADED40C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "C22B5DE3-03ED-4ED4-BD86-278197FA3FC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "652F2CCF-41FE-4DEC-8179-FF285AB99E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "66149AA8-E897-4563-97EC-C5EDCDBE072B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B3F7637-0B4C-40D0-B814-B19F10118795",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "04686A95-05CF-4ACC-89E5-2140DFC423F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "63BB797D-2C82-4A55-A26A-61A6C1C86888",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "465F6E51-0676-4443-9122-CB2AD59C7516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "94970073-415B-4358-833F-CC220653376D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "F26E31D2-31F8-4D4F-AD3A-44C59B22B121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "59513736-11B7-47E6-B5C4-D33F9E032BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*",
              "matchCriteriaId": "931A86E3-43C1-4C72-8425-862C33A2DBA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "15EBA968-C3E0-430E-944D-B4DA30B932C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*",
              "matchCriteriaId": "17A15567-DC96-4513-8681-93CE26B4FA07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1968B0D3-1653-459A-865D-79DBB9AADEE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "7490231F-7FAB-4875-812F-657B7BF4F136",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
    },
    {
      "lang": "es",
      "value": "Los Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, y NIP5100 utiliza el algoritmo DES para las contrase\u00f1as almacenados, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes dependientes de contexto obtener contrase\u00f1as de texto simple a trav\u00e9s de un ataque de fuerza bruta."
    }
  ],
  "id": "CVE-2012-4960",
  "lastModified": "2024-11-21T01:43:49.593",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-06-20T15:55:00.897",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/948096"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/948096"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

var-201306-0006
Vulnerability from variot

The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world's leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei's mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. Successful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. The following are vulnerable: Huawei Quidway series Huawei CX600 V600R001 Huawei CX600 V600R003C00SPC900 Huawei ME60 V600R002C07 and prior versions AR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products ===========================================

[ADVISORY INFORMATION] Title: Weak password encryption on Huawei products Release date: 13/11/2012 Credits: Roberto Paleari, Emaze Networks (roberto.paleari@emaze.net) Ivan Speziale, Emaze Networks (ivan.speziale@emaze.net)

[VULNERABILITY INFORMATION] Class: Information disclosure

[AFFECTED PRODUCTS] We confirm the presence of this security vulnerability on the following products: * Huawei Quidway series * Huawei CX600

Other models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a victim's device can be deciphered instantaneously.

A Python procedure that decodes a given password is included below. Upon termination, procedure decrypt_password() returns the clear-text password.

from Crypto.Cipher import DES

def decode_char(c): if c == 'a': r = '?' else: r = c return ord(r) - ord('!')

def ascii_to_binary(s): assert len(s) == 24

out = [0]*18
i = 0
j = 0

for i in range(0, len(s), 4):
    y = decode_char(s[i + 0])
    y = (y << 6) & 0xffffff

    k = decode_char(s[i + 1])
    y = (y | k) & 0xffffff
    y = (y << 6) & 0xffffff

    k = decode_char(s[i + 2])
    y = (y | k) & 0xffffff
    y = (y << 6) & 0xffffff

    k = decode_char(s[i + 3])
    y = (y | k) & 0xffffff

    out[j+2] = chr(y       & 0xff)
    out[j+1] = chr((y>>8)  & 0xff)
    out[j+0] = chr((y>>16) & 0xff)

    j += 3

return "".join(out)

def decrypt_password(p): r = ascii_to_binary(p)

r = r[:16]

d = DES.new("\x01\x02\x03\x04\x05\x06\x07\x08", DES.MODE_ECB)
r = d.decrypt(r)

return r.rstrip("\x00")

[REMEDIATION] We recommend to store passwords using a proper hashing algorithm, instead of leveraging symmetric encryption. Further details are available at the following URL: http://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141

[COPYRIGHT] Copyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. Permission is hereby granted to redistribute this advisory, providing that no changes are made and that the copyright notices and disclaimers remain intact.

[DISCLAIMER] Emaze Networks S.p.A is not responsible for the misuse of the information provided in our security advisories. These advisories are a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "acu",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003c01spc100"
      },
      {
        "_id": null,
        "model": "acu",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "_id": null,
        "model": "acu",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00spc100"
      },
      {
        "_id": null,
        "model": "ar g3",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "_id": null,
        "model": "ar g3",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c01"
      },
      {
        "_id": null,
        "model": "ar g3",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r002c00spc200"
      },
      {
        "_id": null,
        "model": "atn",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "_id": null,
        "model": "atn",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c01"
      },
      {
        "_id": null,
        "model": "cx200",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "_id": null,
        "model": "cx300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "_id": null,
        "model": "cx600",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r002"
      },
      {
        "_id": null,
        "model": "cx600",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r001"
      },
      {
        "_id": null,
        "model": "cx600",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "_id": null,
        "model": "cx600",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "_id": null,
        "model": "e200e-b",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005c01"
      },
      {
        "_id": null,
        "model": "e200e-c",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "_id": null,
        "model": "e200e-x1",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005c01"
      },
      {
        "_id": null,
        "model": "e200e-x2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005c01"
      },
      {
        "_id": null,
        "model": "eudemon1000",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r006c02"
      },
      {
        "_id": null,
        "model": "eudemon1000e-u",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "_id": null,
        "model": "eudemon1000e-x",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r002"
      },
      {
        "_id": null,
        "model": "eudemon100e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r007"
      },
      {
        "_id": null,
        "model": "eudemon200",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "_id": null,
        "model": "eudemon300",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r006c02"
      },
      {
        "_id": null,
        "model": "eudemon500",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r006c02"
      },
      {
        "_id": null,
        "model": "eudemon8000e-x",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00spc600"
      },
      {
        "_id": null,
        "model": "ma5200g",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r003"
      },
      {
        "_id": null,
        "model": "ma5200g",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v300r003"
      },
      {
        "_id": null,
        "model": "me60",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "_id": null,
        "model": "me60",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "me60",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "_id": null,
        "model": "me60",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "_id": null,
        "model": "me60",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r005c00spc600"
      },
      {
        "_id": null,
        "model": "ne20",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r005"
      },
      {
        "_id": null,
        "model": "ne40",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v300r005"
      },
      {
        "_id": null,
        "model": "ne40e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r001"
      },
      {
        "_id": null,
        "model": "ne5000e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v300r007"
      },
      {
        "_id": null,
        "model": "ne5000e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v800r002"
      },
      {
        "_id": null,
        "model": "ne80",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v300r005"
      },
      {
        "_id": null,
        "model": "ne80e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r001"
      },
      {
        "_id": null,
        "model": "ne80e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "_id": null,
        "model": "ne80e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "_id": null,
        "model": "nip100",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001"
      },
      {
        "_id": null,
        "model": "nip1000",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001"
      },
      {
        "_id": null,
        "model": "nip200",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001"
      },
      {
        "_id": null,
        "model": "nip2100",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "_id": null,
        "model": "nip2200",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "_id": null,
        "model": "nip5100",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "_id": null,
        "model": "s2300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002"
      },
      {
        "_id": null,
        "model": "s2300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003"
      },
      {
        "_id": null,
        "model": "s2300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "_id": null,
        "model": "s2300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "s2700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "s3300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002"
      },
      {
        "_id": null,
        "model": "s3300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003"
      },
      {
        "_id": null,
        "model": "s3300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "_id": null,
        "model": "s3300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "s3300hi",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "s3300hi",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "_id": null,
        "model": "s3700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "_id": null,
        "model": "s3700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "s3700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "_id": null,
        "model": "s5300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002"
      },
      {
        "_id": null,
        "model": "s5300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003"
      },
      {
        "_id": null,
        "model": "s5300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "_id": null,
        "model": "s5300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "s5300hi",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "s5300hi",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "_id": null,
        "model": "s5306",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "s5306",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "_id": null,
        "model": "s5700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "_id": null,
        "model": "s5700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "s5700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "_id": null,
        "model": "s6300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "s6300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "_id": null,
        "model": "s6700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "s6700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "_id": null,
        "model": "s7700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003"
      },
      {
        "_id": null,
        "model": "s7700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "s9300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001"
      },
      {
        "_id": null,
        "model": "s9300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002"
      },
      {
        "_id": null,
        "model": "s9300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003"
      },
      {
        "_id": null,
        "model": "s9300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "_id": null,
        "model": "svn2000",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "_id": null,
        "model": "svn3000",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002c02spc802b041"
      },
      {
        "_id": null,
        "model": "svn5000",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "_id": null,
        "model": "svn5300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c01b019"
      },
      {
        "_id": null,
        "model": "wlan ac 6605",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "_id": null,
        "model": "wlan ac 6605",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00spc100"
      },
      {
        "_id": null,
        "model": "cx600",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "e200x3",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "_id": null,
        "model": "ar 19\\/29\\/49",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "r2207"
      },
      {
        "_id": null,
        "model": "ne40e\\/80e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "_id": null,
        "model": "e200 usg5100",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "_id": null,
        "model": "eudemon usg9300",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "_id": null,
        "model": "h3c ar\\",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "r2209"
      },
      {
        "_id": null,
        "model": "ne20e-x6",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r005"
      },
      {
        "_id": null,
        "model": "ne40e\\/80e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "_id": null,
        "model": "eudemon 8160e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "_id": null,
        "model": "eudemon usg9500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc600"
      },
      {
        "_id": null,
        "model": "eudemon usg5300",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "_id": null,
        "model": "ne40e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r005"
      },
      {
        "_id": null,
        "model": "eudemon 8080e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "_id": null,
        "model": "e200 usg2200",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "_id": null,
        "model": "e200e-usg2100",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c01"
      },
      {
        "_id": null,
        "model": "eudemon usg5500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002"
      },
      {
        "_id": null,
        "model": "e200x5",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "_id": null,
        "model": "e200x7",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "ar 19/29/49",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "r2207"
      },
      {
        "_id": null,
        "model": "e200e-x3",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "_id": null,
        "model": "e200e-x5",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "_id": null,
        "model": "e200e-x7",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "_id": null,
        "model": "e200e/usg2100",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r005c01"
      },
      {
        "_id": null,
        "model": "e200e/usg2200",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "_id": null,
        "model": "e200e/usg5100",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "_id": null,
        "model": "eudemon8080e",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "_id": null,
        "model": "eudemon8160e",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "_id": null,
        "model": "eudemonusg5300",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "_id": null,
        "model": "eudemonusg5500",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r002"
      },
      {
        "_id": null,
        "model": "eudemonusg9300",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "_id": null,
        "model": "eudemonusg9500",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001c00spc600"
      },
      {
        "_id": null,
        "model": "h3c ar",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "ar x9 series r2209"
      },
      {
        "_id": null,
        "model": "ne20e-x6",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "_id": null,
        "model": "ne40e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v300r003"
      },
      {
        "_id": null,
        "model": "ne40e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "_id": null,
        "model": "ne40e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "_id": null,
        "model": "ne40e/80e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v300r003"
      },
      {
        "_id": null,
        "model": "ne40e/80e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v600r001"
      },
      {
        "_id": null,
        "model": "ne40e/80e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "_id": null,
        "model": "ne40e/80e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "_id": null,
        "model": "ne80e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v300r003"
      },
      {
        "_id": null,
        "model": "s2700",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "_id": null,
        "model": "ne5000e v300r007",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "ne5000e v800r002",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "ma5200g v200r003",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "ma5200g v300r003",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "ne40e/80e",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "atn v200r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "atn v200r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "ne40/ne80 v300r005",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "ne20e-x6 v600r003",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "ne20 v200r005",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "me60",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "cx200/cx300 v100r005",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "acu v100r003c01spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "acu v200r001c00spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "acu v200r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "wlan ac v200r001c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "6605"
      },
      {
        "_id": null,
        "model": "wlan ac v200r001c00spc100",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "6605"
      },
      {
        "_id": null,
        "model": "s9300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "s7700",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "s2300/s3300/s5300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "s2300/s3300/s5300/s2700/s3 v100r005",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "s2300/s3300/s5300/s3300hi/ v100r006",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "s3300hi/s5300hi/s5306/s630 v200r001",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "ar g3 v200r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "ar g3 v200r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "ar g3 v200r002c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "h3c ar ar series r2209",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=x9"
      },
      {
        "_id": null,
        "model": "ar r2207",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "19/29/49\u003c="
      },
      {
        "_id": null,
        "model": "eudemon100e v200r007",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "eudemon200 v200r001",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "eudemon300\u0026500\u00261000 v200r006c02",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "_id": null,
        "model": "eudemon1000e-u/usg5300 v200r001",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "_id": null,
        "model": "eudemon1000e-x/usg5500 v200r002",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "_id": null,
        "model": "eudemon8080e\u00268160e/usg9300 v100r003c00",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "_id": null,
        "model": "eudemon8000e-x/usg9500 v200r001c00spc600",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "_id": null,
        "model": "e200e-c\u0026x3\u0026x5\u0026x7/usg2200\u00265100 v200r003c00",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "_id": null,
        "model": "e200e-b\u0026x1\u0026x2/usg2100 v100r005c01",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "_id": null,
        "model": "svn5300 v100r001c01b019",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "svn2000\u00265000 series v200r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "svn3000 v100r002c02spc802b041",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "nip100/200/1000 v100r001",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "nip2100\u00262200\u00265100 v100r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "quidway series",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "quidway series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "0"
      },
      {
        "_id": null,
        "model": "me60 v600r002c07",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "cx600 v600r003c00spc900",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "cx600 v600r001",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "ar r2207",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "19/29/49"
      },
      {
        "_id": null,
        "model": "me60 v600r005c00spc900",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "cx600 v600r005c00spc900",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "cx600 v600r003c00spca00",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "_id": null,
        "model": "ar r2209",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "19/29/49"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "db": "BID",
        "id": "56510"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:huawei:acu",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ar_19%2F29%2F49",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ar_g3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:atn",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:cx200",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:cx300",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:cx600",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:e200e-b",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:e200e-c",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:e200e-x1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:e200e-x2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:e200x3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:e200x5",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:e200x7",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:e200e-usg2100",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:e200_usg2200",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:e200_usg5100",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon1000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon1000e-u",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon1000e-x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon100e",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon200",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon300",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon500",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon8000e-x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon_8080e",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon_8160e",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon_usg5300",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon_usg5500",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon_usg9300",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:eudemon_usg9500",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:h3c_ar%28oem_in%29",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ma5200g",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:me60",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ne20",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ne20e-x6",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ne40",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ne40e",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ne40e%2F80e",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ne5000e",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ne80",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ne80e",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:nip100",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:nip1000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:nip200",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:nip2100",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:nip2200",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:nip5100",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:s2300",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:s2700",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:s3300",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:s3300hi",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:s3700",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:s5300",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:s5300hi",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:s5306",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:s5700",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:s6300",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:s6700",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:s7700",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:s9300",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:svn2000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:svn3000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:svn5000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:svn5300",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:wlan_ac_6605",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Roberto Paleari and Ivan Speziale from Emaze Networks",
    "sources": [
      {
        "db": "BID",
        "id": "56510"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2012-4960",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CVE-2012-4960",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "availabilityRequirement": "NOT DEFINED",
            "baseScore": 6.5,
            "collateralDamagePotential": "LOW-MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "confidentialityRequirement": "NOT DEFINED",
            "enviromentalScore": 5.1,
            "exploitability": "FUNCTIONAL",
            "exploitabilityScore": 8.0,
            "id": "CVE-2012-4960",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "integrityRequirement": "NOT DEFINED",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "remediationLevel": "OFFICIAL FIX",
            "reportConfidence": "CONFIRMED",
            "severity": "MEDIUM",
            "targetDistribution": "MEDIUM",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2013-08074",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "VHN-58241",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-4960",
            "trust": 1.6,
            "value": "MEDIUM"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-4960",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-08074",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201306-403",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-58241",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world\u0027s leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei\u0027s mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. \nSuccessful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. \nThe following are vulnerable:\nHuawei Quidway series\nHuawei CX600 V600R001\nHuawei CX600 V600R003C00SPC900\nHuawei ME60 V600R002C07 and prior versions\nAR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products\n===========================================\n\n[ADVISORY INFORMATION]\nTitle:\t\tWeak password encryption on Huawei products\nRelease date:   13/11/2012\nCredits: \tRoberto Paleari, Emaze Networks (roberto.paleari@emaze.net)\n\t\tIvan Speziale,   Emaze Networks (ivan.speziale@emaze.net)\n\n[VULNERABILITY INFORMATION]\nClass: \t        Information disclosure\n\n[AFFECTED PRODUCTS]\nWe confirm the presence of this security vulnerability on the following\nproducts:\n   * Huawei Quidway series\n   * Huawei CX600\n\nOther models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a\nvictim\u0027s device can be deciphered instantaneously. \n\nA Python procedure that decodes a given password is included below. Upon\ntermination, procedure decrypt_password() returns the clear-text password. \n\n\u003ccut\u003e\nfrom Crypto.Cipher import DES\n\ndef decode_char(c):\n    if c == \u0027a\u0027:\n        r = \u0027?\u0027\n    else:\n        r = c\n    return ord(r) - ord(\u0027!\u0027)\n\ndef ascii_to_binary(s):\n    assert len(s) == 24\n\n    out = [0]*18\n    i = 0\n    j = 0\n\n    for i in range(0, len(s), 4):\n        y = decode_char(s[i + 0])\n        y = (y \u003c\u003c 6) \u0026 0xffffff\n\n        k = decode_char(s[i + 1])\n        y = (y | k) \u0026 0xffffff\n        y = (y \u003c\u003c 6) \u0026 0xffffff\n\n        k = decode_char(s[i + 2])\n        y = (y | k) \u0026 0xffffff\n        y = (y \u003c\u003c 6) \u0026 0xffffff\n\n        k = decode_char(s[i + 3])\n        y = (y | k) \u0026 0xffffff\n\n        out[j+2] = chr(y       \u0026 0xff)\n        out[j+1] = chr((y\u003e\u003e8)  \u0026 0xff)\n        out[j+0] = chr((y\u003e\u003e16) \u0026 0xff)\n\n        j += 3\n\n    return \"\".join(out)\n\ndef decrypt_password(p):\n    r = ascii_to_binary(p)\n\n    r = r[:16]\n\n    d = DES.new(\"\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\", DES.MODE_ECB)\n    r = d.decrypt(r)\n\n    return r.rstrip(\"\\x00\")\n\u003c/cut\u003e\n\n\n[REMEDIATION] \nWe recommend to store passwords using a proper hashing algorithm, instead of\nleveraging symmetric encryption. Further details are available at the following URL:\nhttp://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141\n\n[COPYRIGHT]\nCopyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. \nPermission is hereby granted to redistribute this advisory, providing that no\nchanges are made and that the copyright notices and disclaimers remain intact. \n\n[DISCLAIMER]\nEmaze Networks S.p.A is not responsible for the misuse of the information\nprovided in our security advisories. These advisories are a service to the\nprofessional security community. There are NO WARRANTIES with regard to this\ninformation. Any application or distribution of this information constitutes\nacceptance AS IS, at the user\u0027s own risk. This information is subject to change\nwithout notice",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      },
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "db": "BID",
        "id": "56510"
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      },
      {
        "db": "PACKETSTORM",
        "id": "118054"
      }
    ],
    "trust": 3.87
  },
  "exploit_availability": {
    "_id": null,
    "data": [
      {
        "reference": "https://www.kb.cert.org/vuls/id/948096",
        "trust": 0.8,
        "type": "unknown"
      },
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-58241",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      }
    ]
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-4960",
        "trust": 3.4
      },
      {
        "db": "CERT/CC",
        "id": "VU#948096",
        "trust": 2.7
      },
      {
        "db": "BID",
        "id": "56510",
        "trust": 1.6
      },
      {
        "db": "JVN",
        "id": "JVNVU90202792",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "118054",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "38020",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      },
      {
        "db": "BID",
        "id": "56510"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "PACKETSTORM",
        "id": "118054"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      }
    ]
  },
  "id": "VAR-201306-0006",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      }
    ],
    "trust": 2.165337808214286
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 1.2
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      }
    ]
  },
  "last_update_date": "2024-09-09T23:07:12.342000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Huawei-SA-20120827-01-CX600",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
      },
      {
        "title": "Huawei multiple product encryption is not a strong vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/34800"
      },
      {
        "title": "Huawei patch for multiple product password encryption vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/25088"
      },
      {
        "title": "Huawei Fixing measures for vulnerabilities of encryption problems in many products",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=170984"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
      },
      {
        "trust": 1.9,
        "url": "http://www.kb.cert.org/vuls/id/948096"
      },
      {
        "trust": 0.8,
        "url": "about vulnerability notes"
      },
      {
        "trust": 0.8,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 0.8,
        "url": "provide a vendor statement"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4960"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu90202792/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4960"
      },
      {
        "trust": 0.6,
        "url": "http://packetstormsecurity.org/files/118054/huawei-weak-password-encryption.html"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/56510"
      },
      {
        "trust": 0.4,
        "url": "http://support.huawei.com/enterprise/readlatestnewsaction.action?contentid=news1000001141"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com/"
      },
      {
        "trust": 0.3,
        "url": "msg://bugtraq/201211130911.qad9ba1q022014@sf01web1.securityfocus.com"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      },
      {
        "db": "BID",
        "id": "56510"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "PACKETSTORM",
        "id": "118054"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#948096",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241",
        "ident": null
      },
      {
        "db": "BID",
        "id": "56510",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "118054",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4960",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2013-08-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#948096",
        "ident": null
      },
      {
        "date": "2013-06-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-08074",
        "ident": null
      },
      {
        "date": "2012-11-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-6517",
        "ident": null
      },
      {
        "date": "2013-06-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-58241",
        "ident": null
      },
      {
        "date": "2012-11-13T00:00:00",
        "db": "BID",
        "id": "56510",
        "ident": null
      },
      {
        "date": "2013-06-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-006004",
        "ident": null
      },
      {
        "date": "2012-11-13T23:22:55",
        "db": "PACKETSTORM",
        "id": "118054",
        "ident": null
      },
      {
        "date": "2012-11-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201211-280",
        "ident": null
      },
      {
        "date": "2013-06-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201306-403",
        "ident": null
      },
      {
        "date": "2013-06-20T15:55:00.897000",
        "db": "NVD",
        "id": "CVE-2012-4960",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2013-10-03T00:00:00",
        "db": "CERT/CC",
        "id": "VU#948096",
        "ident": null
      },
      {
        "date": "2013-07-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-08074",
        "ident": null
      },
      {
        "date": "2012-11-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-6517",
        "ident": null
      },
      {
        "date": "2013-08-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-58241",
        "ident": null
      },
      {
        "date": "2015-03-19T08:28:00",
        "db": "BID",
        "id": "56510",
        "ident": null
      },
      {
        "date": "2013-08-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-006004",
        "ident": null
      },
      {
        "date": "2012-12-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201211-280",
        "ident": null
      },
      {
        "date": "2021-11-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201306-403",
        "ident": null
      },
      {
        "date": "2013-08-22T03:59:17.713000",
        "db": "NVD",
        "id": "CVE-2012-4960",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      }
    ],
    "trust": 1.2
  },
  "title": {
    "_id": null,
    "data": "Huawei networking equipment weak password cipher",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      }
    ],
    "trust": 1.2
  }
}