Vulnerabilites related to huawei - smc2.0
cve-2020-9209
Vulnerability from cvelistv5
Published
2021-01-13 22:04
Modified
2024-08-04 10:19
Severity ?
Summary
There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products.
Impacted products
Vendor Product Version
n/a SMC2.0 Version: V600R006C00SPC700,V600R006C00SPC800,V600R006C10SPC500,V600R006C10SPC600,V600R006C10SPC601,V600R006C10SPC602,V600R006C10SPC700,V600R006C10SPC800,V600R006C10SPCa00,V600R006C10SPCb00,V600R006C10SPCc00,V600R006C10SPCd00,V600R006C10SPCe00,V600R019C00,V600R019C10
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:19:20.057Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SMC2.0",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "V600R006C00SPC700,V600R006C00SPC800,V600R006C10SPC500,V600R006C10SPC600,V600R006C10SPC601,V600R006C10SPC602,V600R006C10SPC700,V600R006C10SPC800,V600R006C10SPCa00,V600R006C10SPCb00,V600R006C10SPCc00,V600R006C10SPCd00,V600R006C10SPCe00,V600R019C00,V600R019C10"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Privilege Escalation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-13T22:04:37",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2020-9209",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SMC2.0",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V600R006C00SPC700,V600R006C00SPC800,V600R006C10SPC500,V600R006C10SPC600,V600R006C10SPC601,V600R006C10SPC602,V600R006C10SPC700,V600R006C10SPC800,V600R006C10SPCa00,V600R006C10SPCb00,V600R006C10SPCc00,V600R006C10SPCd00,V600R006C10SPCe00,V600R019C00,V600R019C10"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Privilege Escalation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en",
              "refsource": "MISC",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2020-9209",
    "datePublished": "2021-01-13T22:04:37",
    "dateReserved": "2020-02-18T00:00:00",
    "dateUpdated": "2024-08-04T10:19:20.057Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-0708
Vulnerability from cvelistv5
Published
2019-05-16 18:17
Modified
2025-02-07 16:28
Severity ?
Summary
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
Impacted products
Vendor Product Version
Microsoft Windows Version: 7 for 32-bit Systems Service Pack 1
Version: 7 for x64-based Systems Service Pack 1
Create a notification for this product.
   Microsoft Windows Server Version: 2008 R2 for x64-based Systems Service Pack 1 (Core installation)
Version: 2008 R2 for Itanium-Based Systems Service Pack 1
Version: 2008 R2 for x64-based Systems Service Pack 1
Version: 2008 for 32-bit Systems Service Pack 2 (Core installation)
Version: 2008 for Itanium-Based Systems Service Pack 2
Version: 2008 for 32-bit Systems Service Pack 2
Version: 2008 for x64-based Systems Service Pack 2
Version: 2008 for x64-based Systems Service Pack 2 (Core installation)
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:51:27.186Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2019-0708",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-07T16:17:22.676231Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-0708"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-416",
                "description": "CWE-416 Use After Free",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-07T16:28:16.043Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Windows",
          "vendor": "Microsoft",
          "versions": [
            {
              "status": "affected",
              "version": "7 for 32-bit Systems Service Pack 1"
            },
            {
              "status": "affected",
              "version": "7 for x64-based Systems Service Pack 1"
            }
          ]
        },
        {
          "product": "Windows Server",
          "vendor": "Microsoft",
          "versions": [
            {
              "status": "affected",
              "version": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"
            },
            {
              "status": "affected",
              "version": "2008 R2 for Itanium-Based Systems Service Pack 1"
            },
            {
              "status": "affected",
              "version": "2008 R2 for x64-based Systems Service Pack 1"
            },
            {
              "status": "affected",
              "version": "2008 for 32-bit Systems Service Pack 2 (Core installation)"
            },
            {
              "status": "affected",
              "version": "2008 for Itanium-Based Systems Service Pack 2"
            },
            {
              "status": "affected",
              "version": "2008 for 32-bit Systems Service Pack 2"
            },
            {
              "status": "affected",
              "version": "2008 for x64-based Systems Service Pack 2"
            },
            {
              "status": "affected",
              "version": "2008 for x64-based Systems Service Pack 2 (Core installation)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Remote Desktop Services Remote Code Execution Vulnerability\u0027."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Remote Code Execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-03T17:06:16.000Z",
        "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
        "shortName": "microsoft"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@microsoft.com",
          "ID": "CVE-2019-0708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Windows",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "7 for 32-bit Systems Service Pack 1"
                          },
                          {
                            "version_value": "7 for x64-based Systems Service Pack 1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"
                          },
                          {
                            "version_value": "2008 R2 for Itanium-Based Systems Service Pack 1"
                          },
                          {
                            "version_value": "2008 R2 for x64-based Systems Service Pack 1"
                          },
                          {
                            "version_value": "2008 for 32-bit Systems Service Pack 2 (Core installation)"
                          },
                          {
                            "version_value": "2008 for Itanium-Based Systems Service Pack 2"
                          },
                          {
                            "version_value": "2008 for 32-bit Systems Service Pack 2"
                          },
                          {
                            "version_value": "2008 for x64-based Systems Service Pack 2"
                          },
                          {
                            "version_value": "2008 for x64-based Systems Service Pack 2 (Core installation)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Microsoft"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Remote Desktop Services Remote Code Execution Vulnerability\u0027."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Remote Code Execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708",
              "refsource": "MISC",
              "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf"
            },
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en"
            },
            {
              "name": "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en"
            },
            {
              "name": "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html"
            },
            {
              "name": "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html"
            },
            {
              "name": "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html"
            },
            {
              "name": "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html"
            },
            {
              "name": "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
    "assignerShortName": "microsoft",
    "cveId": "CVE-2019-0708",
    "datePublished": "2019-05-16T18:17:00.000Z",
    "dateReserved": "2018-11-26T00:00:00.000Z",
    "dateUpdated": "2025-02-07T16:28:16.043Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-19415
Vulnerability from cvelistv5
Published
2020-07-08 16:58
Modified
2024-08-05 02:16
Severity ?
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
Impacted products
Vendor Product Version
Huawei AR120-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20 V200R008C30
Create a notification for this product.
   Huawei AR1200 Version: V200R006C10
Version: V200R007C00
Version: V200R008C20 V200R008C30
Create a notification for this product.
   Huawei AR1200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR150 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR150-S Version: V200R006C10SPC300
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR160 Version: V200R006C10
Version: V200R006C12
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR200 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR2200 Version: V200R006C10
Version: V200R006C13
Version: V200R006C16PWE
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR2200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR3200 Version: V200R006C10
Version: V200R006C11
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C00
Version: V200R008C10
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR3600 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R008C20
Create a notification for this product.
   Huawei AR510 Version: V200R006C10
Version: V200R006C12
Version: V200R006C13
Version: V200R006C15
Version: V200R006C16
Version: V200R006C17
Version: V200R007C00SPC180T
Version: V200R007C00SPC600
Version: V200R007C00SPC900
Version: V200R007C00SPCb00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei DP300 Version: V500R002C00
Create a notification for this product.
   Huawei IPS Module Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NGFW Module Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R002C00
Version: V500R002C10
Create a notification for this product.
   Huawei NIP6300 Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NIP6600 Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NIP6800 Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NetEngine16EX Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei RSE6500 Version: V500R002C00
Create a notification for this product.
   Huawei SMC2.0 Version: V100R003C00SPC200T
Version: V100R003C00SPC300T
Version: V100R003C00SPC301T
Version: V100R003C10
Version: V100R005C00SPC100
Version: V100R005C00SPC101B001T
Version: V100R005C00SPC102
Version: V100R005C00SPC103
Version: V100R005C00SPC200
Version: V100R005C00SPC201T
Version: V500R002C00
Version: V600R006C00
Create a notification for this product.
   Huawei SRG1300 Version: V200R006C10
Version: V200R007C00
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SRG2300 Version: V200R006C10
Version: V200R007C00
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SRG3300 Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SVN5600 Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SVN5800 Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SVN5800-C Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SeMG9811 Version: V300R001C01SPC500
Version: V300R001C01SPC500T
Version: V300R001C01SPC700
Version: V300R001C01SPCa00
Create a notification for this product.
   Huawei Secospace USG6300 Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei Secospace USG6500 Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei Secospace USG6600 Version: V100R001C00
Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei SoftCo Version: V200R001C01SPC300
Version: V200R001C01SPC400
Version: V200R001C01SPC500
Version: V200R001C01SPC600
Version: V200R001C01SPH703
Version: V200R003C00SPC100
Version: V200R003C00SPC200
Version: V200R003C00SPC300
Version: V200R003C00SPC500
Version: V200R003C20
Create a notification for this product.
   Huawei TE30 Version: V100R001C02SPC100
Version: V100R001C02SPC200 V100R001C10
Version: V500R002C00SPC200
Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC900
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE40 Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC900
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE50 Version: V500R002C00SPC600
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE60 Version: V100R001C01SPC100
Version: V100R001C10
Version: V100R001C10SPC300
Version: V100R001C10SPC400
Version: V100R001C10SPC500
Version: V100R001C10SPC600
Version: V100R001C10SPC800
Version: V100R003C00
Version: V500R002C00
Version: V500R002C00SPC100
Version: V500R002C00SPC200
Version: V500R002C00SPC300
Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC800
Version: V500R002C00SPC900
Version: V500R002C00SPCa00
Version: V500R002C00SPCb00
Version: V600R006C00
Version: V600R006C00SPC200
Create a notification for this product.
   Huawei TP3206 Version: V100R002C00
Create a notification for this product.
   Huawei USG9500 Version: V300R001C01
Version: V300R001C20
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei USG9520 Version: V300R001C01SPC800PWE
Create a notification for this product.
   Huawei USG9560 Version: V300R001C20SPC300
Create a notification for this product.
   Huawei VP9660 Version: V200R001C02SPC100
Version: V200R001C02SPC200
Version: V200R001C02SPC300
Version: V200R001C02SPC300T
Version: V200R001C02SPC400
Version: V200R001C30SPC100
Version: V200R001C30SPC100B015T
Version: V200R001C30SPC101
Version: V200R001C30SPC101TB015
Version: V200R001C30SPC102T
Version: V200R001C30SPC103T
Version: V200R001C30SPC104T
Version: V200R001C30SPC200
Version: V200R001C30SPC200B022T
Version: V200R001C30SPC201B023T
Version: V200R001C30SPC202B025T
Version: V200R001C30SPC203T
Version: V200R001C30SPC206T
Version: V200R001C30SPC207T
Version: V200R001C30SPC208T
Version: V200R001C30SPC209T
Version: V200R001C30SPC300
Version: V200R001C30SPC400
Version: V200R001C30SPC400B001
Version: V200R001C30SPC400T
Version: V200R001C30SPC401T
Version: V200R001C30SPC402T
Version: V200R001C30SPC403T
Version: V200R001C30SPC404T
Version: V200R001C30SPC405T
Version: V200R001C30SPC600
Version: V200R001C30SPC700
Version: V200R001C30SPC700T
Version: V200R001C30SPC701T
Version: V200R001C30SPC702T
Version: V200R001C30SPC703T
Version: V200R001C30SPC800
Version: V200R001C30SPC800T
Version: V200R001C30SPC900
Version: V200R001C30SPCa00
Version: V200R001C30SPCa00T
Version: V200R001C30SPCa01
Version: V200R001C30SPCa01T
Version: V200R001C30SPCa02T
Version: V200R001C30SPCb00
Version: V200R001C30SPCc00
Version: V200R001C30SPCd00
Version: V200R001C30SPCd00T
Version: V200R001C30SPCd01T
Version: V200R001C30SPCd
Create a notification for this product.
   Huawei ViewPoint 8660 Version: V100R008C03B013SP02
Version: V100R008C03B013SP03
Version: V100R008C03B013SP04
Version: V100R008C03SPC100
Version: V100R008C03SPC200
Version: V100R008C03SPC300
Version: V100R008C03SPC400
Version: V100R008C03SPC500
Version: V100R008C03SPC600
Version: V100R008C03SPC700
Version: V100R008C03SPC800
Version: V100R008C03SPC900
Version: V100R008C03SPCa00
Version: V100R008C03SPCb00
Version: V100R008C03SPCc00
Create a notification for this product.
   Huawei ViewPoint 9030 Version: V100R011C02SPC100
Version: V100R011C03B012SP15
Version: V100R011C03B012SP16
Version: V100R011C03B015SP03
Version: V100R011C03LGWL01SPC100
Version: V100R011C03LGWL01SPC100B012
Version: V100R011C03SPC100
Version: V100R011C03SPC200
Version: V100R011C03SPC300
Version: V100R011C03SPC400
Version: V100R011C03SPC500
Create a notification for this product.
   Huawei eSpace U1910 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1911 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1930 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1960 Version: V100R001C01SPC500
Version: V100R001C20LCRW01T
Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC600
Version: V100R001C20SPC600T
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1980 Version: V100R001C01SPC500T
Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500T
Version: V100R001C20SPC502
Version: V100R001C20SPC600
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1981 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPC700
Version: V100R001C20SPH702
Version: V100R001C20SPH703
Version: V100R001C30
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T02:16:47.092Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20 V200R008C30"
            }
          ]
        },
        {
          "product": "AR1200",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20 V200R008C30"
            }
          ]
        },
        {
          "product": "AR1200-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR150",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR150-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10SPC300"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR160",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R006C12"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR200",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR200-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR2200",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R006C13"
            },
            {
              "status": "affected",
              "version": "V200R006C16PWE"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR2200-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR3200",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R006C11"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C00"
            },
            {
              "status": "affected",
              "version": "V200R008C10"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR3600",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            }
          ]
        },
        {
          "product": "AR510",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R006C12"
            },
            {
              "status": "affected",
              "version": "V200R006C13"
            },
            {
              "status": "affected",
              "version": "V200R006C15"
            },
            {
              "status": "affected",
              "version": "V200R006C16"
            },
            {
              "status": "affected",
              "version": "V200R006C17"
            },
            {
              "status": "affected",
              "version": "V200R007C00SPC180T"
            },
            {
              "status": "affected",
              "version": "V200R007C00SPC600"
            },
            {
              "status": "affected",
              "version": "V200R007C00SPC900"
            },
            {
              "status": "affected",
              "version": "V200R007C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "DP300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R002C00"
            }
          ]
        },
        {
          "product": "IPS Module",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "NGFW Module",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R002C00"
            },
            {
              "status": "affected",
              "version": "V500R002C10"
            }
          ]
        },
        {
          "product": "NIP6300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "NIP6600",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "NIP6800",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "NetEngine16EX",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "RSE6500",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R002C00"
            }
          ]
        },
        {
          "product": "SMC2.0",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R003C00SPC200T"
            },
            {
              "status": "affected",
              "version": "V100R003C00SPC300T"
            },
            {
              "status": "affected",
              "version": "V100R003C00SPC301T"
            },
            {
              "status": "affected",
              "version": "V100R003C10"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC100"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC101B001T"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC102"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC103"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC200"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC201T"
            },
            {
              "status": "affected",
              "version": "V500R002C00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            }
          ]
        },
        {
          "product": "SRG1300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "SRG2300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "SRG3300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "SVN5600",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C10"
            }
          ]
        },
        {
          "product": "SVN5800",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C10"
            }
          ]
        },
        {
          "product": "SVN5800-C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C10"
            }
          ]
        },
        {
          "product": "SeMG9811",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V300R001C01SPC500"
            },
            {
              "status": "affected",
              "version": "V300R001C01SPC500T"
            },
            {
              "status": "affected",
              "version": "V300R001C01SPC700"
            },
            {
              "status": "affected",
              "version": "V300R001C01SPCa00"
            }
          ]
        },
        {
          "product": "Secospace USG6300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "Secospace USG6500",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "Secospace USG6600",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C00"
            },
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "SoftCo",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R001C01SPC300"
            },
            {
              "status": "affected",
              "version": "V200R001C01SPC400"
            },
            {
              "status": "affected",
              "version": "V200R001C01SPC500"
            },
            {
              "status": "affected",
              "version": "V200R001C01SPC600"
            },
            {
              "status": "affected",
              "version": "V200R001C01SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00SPC100"
            },
            {
              "status": "affected",
              "version": "V200R003C00SPC200"
            },
            {
              "status": "affected",
              "version": "V200R003C00SPC300"
            },
            {
              "status": "affected",
              "version": "V200R003C00SPC500"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            }
          ]
        },
        {
          "product": "TE30",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C02SPC100"
            },
            {
              "status": "affected",
              "version": "V100R001C02SPC200 V100R001C10"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC200"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC600"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC700"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC900"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            }
          ]
        },
        {
          "product": "TE40",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R002C00SPC600"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC700"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC900"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            }
          ]
        },
        {
          "product": "TE50",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R002C00SPC600"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            }
          ]
        },
        {
          "product": "TE60",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C01SPC100"
            },
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC800"
            },
            {
              "status": "affected",
              "version": "V100R003C00"
            },
            {
              "status": "affected",
              "version": "V500R002C00"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC100"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC200"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC300"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC600"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC700"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC800"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC900"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCa00"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            },
            {
              "status": "affected",
              "version": "V600R006C00SPC200"
            }
          ]
        },
        {
          "product": "TP3206",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R002C00"
            }
          ]
        },
        {
          "product": "USG9500",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V300R001C01"
            },
            {
              "status": "affected",
              "version": "V300R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "USG9520",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V300R001C01SPC800PWE"
            }
          ]
        },
        {
          "product": "USG9560",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V300R001C20SPC300"
            }
          ]
        },
        {
          "product": "VP9660",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R001C02SPC100"
            },
            {
              "status": "affected",
              "version": "V200R001C02SPC200"
            },
            {
              "status": "affected",
              "version": "V200R001C02SPC300"
            },
            {
              "status": "affected",
              "version": "V200R001C02SPC300T"
            },
            {
              "status": "affected",
              "version": "V200R001C02SPC400"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC100"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC100B015T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC101"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC101TB015"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC102T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC103T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC104T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC200"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC200B022T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC201B023T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC202B025T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC203T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC206T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC207T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC208T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC209T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC300"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC400"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC400B001"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC400T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC401T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC402T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC403T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC404T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC405T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC600"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC700"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC700T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC701T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC702T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC703T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC800"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC800T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC900"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa00"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa00T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa01"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa01T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa02T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCb00"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCc00"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCd00"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCd00T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCd01T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCd"
            }
          ]
        },
        {
          "product": "ViewPoint 8660",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R008C03B013SP02"
            },
            {
              "status": "affected",
              "version": "V100R008C03B013SP03"
            },
            {
              "status": "affected",
              "version": "V100R008C03B013SP04"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC100"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC200"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC300"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC400"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC500"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC600"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC700"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC800"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC900"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPCa00"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPCb00"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPCc00"
            }
          ]
        },
        {
          "product": "ViewPoint 9030",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R011C02SPC100"
            },
            {
              "status": "affected",
              "version": "V100R011C03B012SP15"
            },
            {
              "status": "affected",
              "version": "V100R011C03B012SP16"
            },
            {
              "status": "affected",
              "version": "V100R011C03B015SP03"
            },
            {
              "status": "affected",
              "version": "V100R011C03LGWL01SPC100"
            },
            {
              "status": "affected",
              "version": "V100R011C03LGWL01SPC100B012"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC100"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC200"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC300"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC400"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC500"
            }
          ]
        },
        {
          "product": "eSpace U1910",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1911",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH309"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1930",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1960",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C01SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20LCRW01T"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600T"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH309"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1980",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C01SPC500T"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500T"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC502"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH309"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1981",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC700"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH702"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "DoS",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-08T16:58:31",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-19415",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20 V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR1200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20 V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR1200-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR150",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR150-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10SPC300"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR160",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R006C12"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR200-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR2200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R006C13"
                          },
                          {
                            "version_value": "V200R006C16PWE"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR2200-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR3200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R006C11"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C00"
                          },
                          {
                            "version_value": "V200R008C10"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR3600",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R008C20"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR510",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R006C12"
                          },
                          {
                            "version_value": "V200R006C13"
                          },
                          {
                            "version_value": "V200R006C15"
                          },
                          {
                            "version_value": "V200R006C16"
                          },
                          {
                            "version_value": "V200R006C17"
                          },
                          {
                            "version_value": "V200R007C00SPC180T"
                          },
                          {
                            "version_value": "V200R007C00SPC600"
                          },
                          {
                            "version_value": "V200R007C00SPC900"
                          },
                          {
                            "version_value": "V200R007C00SPCb00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "DP300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R002C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "IPS Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NGFW Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R002C00"
                          },
                          {
                            "version_value": "V500R002C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NIP6300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NIP6600",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NIP6800",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "NetEngine16EX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RSE6500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R002C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SMC2.0",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R003C00SPC200T"
                          },
                          {
                            "version_value": "V100R003C00SPC300T"
                          },
                          {
                            "version_value": "V100R003C00SPC301T"
                          },
                          {
                            "version_value": "V100R003C10"
                          },
                          {
                            "version_value": "V100R005C00SPC100"
                          },
                          {
                            "version_value": "V100R005C00SPC101B001T"
                          },
                          {
                            "version_value": "V100R005C00SPC102"
                          },
                          {
                            "version_value": "V100R005C00SPC103"
                          },
                          {
                            "version_value": "V100R005C00SPC200"
                          },
                          {
                            "version_value": "V100R005C00SPC201T"
                          },
                          {
                            "version_value": "V500R002C00"
                          },
                          {
                            "version_value": "V600R006C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SRG1300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SRG2300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SRG3300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SVN5600",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SVN5800",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SVN5800-C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SeMG9811",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V300R001C01SPC500"
                          },
                          {
                            "version_value": "V300R001C01SPC500T"
                          },
                          {
                            "version_value": "V300R001C01SPC700"
                          },
                          {
                            "version_value": "V300R001C01SPCa00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Secospace USG6300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Secospace USG6500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Secospace USG6600",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C00"
                          },
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SoftCo",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R001C01SPC300"
                          },
                          {
                            "version_value": "V200R001C01SPC400"
                          },
                          {
                            "version_value": "V200R001C01SPC500"
                          },
                          {
                            "version_value": "V200R001C01SPC600"
                          },
                          {
                            "version_value": "V200R001C01SPH703"
                          },
                          {
                            "version_value": "V200R003C00SPC100"
                          },
                          {
                            "version_value": "V200R003C00SPC200"
                          },
                          {
                            "version_value": "V200R003C00SPC300"
                          },
                          {
                            "version_value": "V200R003C00SPC500"
                          },
                          {
                            "version_value": "V200R003C20"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TE30",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C02SPC100"
                          },
                          {
                            "version_value": "V100R001C02SPC200 V100R001C10"
                          },
                          {
                            "version_value": "V500R002C00SPC200"
                          },
                          {
                            "version_value": "V500R002C00SPC600"
                          },
                          {
                            "version_value": "V500R002C00SPC700"
                          },
                          {
                            "version_value": "V500R002C00SPC900"
                          },
                          {
                            "version_value": "V500R002C00SPCb00"
                          },
                          {
                            "version_value": "V600R006C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TE40",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R002C00SPC600"
                          },
                          {
                            "version_value": "V500R002C00SPC700"
                          },
                          {
                            "version_value": "V500R002C00SPC900"
                          },
                          {
                            "version_value": "V500R002C00SPCb00"
                          },
                          {
                            "version_value": "V600R006C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TE50",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R002C00SPC600"
                          },
                          {
                            "version_value": "V500R002C00SPCb00"
                          },
                          {
                            "version_value": "V600R006C00"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TE60",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C01SPC100"
                          },
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C10SPC300"
                          },
                          {
                            "version_value": "V100R001C10SPC400"
                          },
                          {
                            "version_value": "V100R001C10SPC500"
                          },
                          {
                            "version_value": "V100R001C10SPC600"
                          },
                          {
                            "version_value": "V100R001C10SPC800"
                          },
                          {
                            "version_value": "V100R003C00"
                          },
                          {
                            "version_value": "V500R002C00"
                          },
                          {
                            "version_value": "V500R002C00SPC100"
                          },
                          {
                            "version_value": "V500R002C00SPC200"
                          },
                          {
                            "version_value": "V500R002C00SPC300"
                          },
                          {
                            "version_value": "V500R002C00SPC600"
                          },
                          {
                            "version_value": "V500R002C00SPC700"
                          },
                          {
                            "version_value": "V500R002C00SPC800"
                          },
                          {
                            "version_value": "V500R002C00SPC900"
                          },
                          {
                            "version_value": "V500R002C00SPCa00"
                          },
                          {
                            "version_value": "V500R002C00SPCb00"
                          },
                          {
                            "version_value": "V600R006C00"
                          },
                          {
                            "version_value": "V600R006C00SPC200"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TP3206",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R002C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "USG9500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V300R001C01"
                          },
                          {
                            "version_value": "V300R001C20"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "USG9520",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V300R001C01SPC800PWE"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "USG9560",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V300R001C20SPC300"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VP9660",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R001C02SPC100"
                          },
                          {
                            "version_value": "V200R001C02SPC200"
                          },
                          {
                            "version_value": "V200R001C02SPC300"
                          },
                          {
                            "version_value": "V200R001C02SPC300T"
                          },
                          {
                            "version_value": "V200R001C02SPC400"
                          },
                          {
                            "version_value": "V200R001C30SPC100"
                          },
                          {
                            "version_value": "V200R001C30SPC100B015T"
                          },
                          {
                            "version_value": "V200R001C30SPC101"
                          },
                          {
                            "version_value": "V200R001C30SPC101TB015"
                          },
                          {
                            "version_value": "V200R001C30SPC102T"
                          },
                          {
                            "version_value": "V200R001C30SPC103T"
                          },
                          {
                            "version_value": "V200R001C30SPC104T"
                          },
                          {
                            "version_value": "V200R001C30SPC200"
                          },
                          {
                            "version_value": "V200R001C30SPC200B022T"
                          },
                          {
                            "version_value": "V200R001C30SPC201B023T"
                          },
                          {
                            "version_value": "V200R001C30SPC202B025T"
                          },
                          {
                            "version_value": "V200R001C30SPC203T"
                          },
                          {
                            "version_value": "V200R001C30SPC206T"
                          },
                          {
                            "version_value": "V200R001C30SPC207T"
                          },
                          {
                            "version_value": "V200R001C30SPC208T"
                          },
                          {
                            "version_value": "V200R001C30SPC209T"
                          },
                          {
                            "version_value": "V200R001C30SPC300"
                          },
                          {
                            "version_value": "V200R001C30SPC400"
                          },
                          {
                            "version_value": "V200R001C30SPC400B001"
                          },
                          {
                            "version_value": "V200R001C30SPC400T"
                          },
                          {
                            "version_value": "V200R001C30SPC401T"
                          },
                          {
                            "version_value": "V200R001C30SPC402T"
                          },
                          {
                            "version_value": "V200R001C30SPC403T"
                          },
                          {
                            "version_value": "V200R001C30SPC404T"
                          },
                          {
                            "version_value": "V200R001C30SPC405T"
                          },
                          {
                            "version_value": "V200R001C30SPC600"
                          },
                          {
                            "version_value": "V200R001C30SPC700"
                          },
                          {
                            "version_value": "V200R001C30SPC700T"
                          },
                          {
                            "version_value": "V200R001C30SPC701T"
                          },
                          {
                            "version_value": "V200R001C30SPC702T"
                          },
                          {
                            "version_value": "V200R001C30SPC703T"
                          },
                          {
                            "version_value": "V200R001C30SPC800"
                          },
                          {
                            "version_value": "V200R001C30SPC800T"
                          },
                          {
                            "version_value": "V200R001C30SPC900"
                          },
                          {
                            "version_value": "V200R001C30SPCa00"
                          },
                          {
                            "version_value": "V200R001C30SPCa00T"
                          },
                          {
                            "version_value": "V200R001C30SPCa01"
                          },
                          {
                            "version_value": "V200R001C30SPCa01T"
                          },
                          {
                            "version_value": "V200R001C30SPCa02T"
                          },
                          {
                            "version_value": "V200R001C30SPCb00"
                          },
                          {
                            "version_value": "V200R001C30SPCc00"
                          },
                          {
                            "version_value": "V200R001C30SPCd00"
                          },
                          {
                            "version_value": "V200R001C30SPCd00T"
                          },
                          {
                            "version_value": "V200R001C30SPCd01T"
                          },
                          {
                            "version_value": "V200R001C30SPCd"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ViewPoint 8660",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R008C03B013SP02"
                          },
                          {
                            "version_value": "V100R008C03B013SP03"
                          },
                          {
                            "version_value": "V100R008C03B013SP04"
                          },
                          {
                            "version_value": "V100R008C03SPC100"
                          },
                          {
                            "version_value": "V100R008C03SPC200"
                          },
                          {
                            "version_value": "V100R008C03SPC300"
                          },
                          {
                            "version_value": "V100R008C03SPC400"
                          },
                          {
                            "version_value": "V100R008C03SPC500"
                          },
                          {
                            "version_value": "V100R008C03SPC600"
                          },
                          {
                            "version_value": "V100R008C03SPC700"
                          },
                          {
                            "version_value": "V100R008C03SPC800"
                          },
                          {
                            "version_value": "V100R008C03SPC900"
                          },
                          {
                            "version_value": "V100R008C03SPCa00"
                          },
                          {
                            "version_value": "V100R008C03SPCb00"
                          },
                          {
                            "version_value": "V100R008C03SPCc00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ViewPoint 9030",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R011C02SPC100"
                          },
                          {
                            "version_value": "V100R011C03B012SP15"
                          },
                          {
                            "version_value": "V100R011C03B012SP16"
                          },
                          {
                            "version_value": "V100R011C03B015SP03"
                          },
                          {
                            "version_value": "V100R011C03LGWL01SPC100"
                          },
                          {
                            "version_value": "V100R011C03LGWL01SPC100B012"
                          },
                          {
                            "version_value": "V100R011C03SPC100"
                          },
                          {
                            "version_value": "V100R011C03SPC200"
                          },
                          {
                            "version_value": "V100R011C03SPC300"
                          },
                          {
                            "version_value": "V100R011C03SPC400"
                          },
                          {
                            "version_value": "V100R011C03SPC500"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1910",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1911",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPH309"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1930",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "eSpace U1960",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C01SPC500"
                          },
                          {
                            "version_value": "V100R001C20LCRW01T"
                          },
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPC600T"
                          },
                          {
                            "version_value": "V100R001C20SPH309"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1980",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C01SPC500T"
                          },
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500T"
                          },
                          {
                            "version_value": "V100R001C20SPC502"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPH309"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1981",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPC700"
                          },
                          {
                            "version_value": "V100R001C20SPH702"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "DoS"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-19415",
    "datePublished": "2020-07-08T16:58:31",
    "dateReserved": "2019-11-29T00:00:00",
    "dateUpdated": "2024-08-05T02:16:47.092Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-22299
Vulnerability from cvelistv5
Published
2021-02-06 01:53
Modified
2024-08-03 18:37
Severity ?
Summary
There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220.
Impacted products
Vendor Product Version
n/a ManageOne Version: 6.5.0
Version: 6.5.0.SPC100.B210
Version: 6.5.1.1.B010
Version: 6.5.1.1.B020
Version: 6.5.1.1.B030
Version: 6.5.1.1.B040
Version: 6.5.1.SPC100.B050
Version: 6.5.1.SPC101.B010
Version: 6.5.1.SPC101.B040
Version: 6.5.1.SPC200
Version: 6.5.1.SPC200.B010
Version: 6.5.1.SPC200.B030
Version: 6.5.1.SPC200.B040
Version: 6.5.1.SPC200.B050
Version: 6.5.1.SPC200.B060
Version: 6.5.1.SPC200.B070
Version: 6.5.1RC1.B060
Version: 6.5.1RC2.B020
Version: 6.5.1RC2.B030
Version: 6.5.1RC2.B040
Version: 6.5.1RC2.B050
Version: 6.5.1RC2.B060
Version: 6.5.1RC2.B070
Version: 6.5.1RC2.B080
Version: 6.5.1RC2.B090
Version: 6.5.RC2.B050
Version: 8.0.0
Version: 8.0.0-LCND81
Version: 8.0.0.SPC100
Version: 8.0.1
Version: 8.0.RC2
Version: 8.0.RC3
Version: 8.0.RC3.B041
Version: 8.0.RC3.SPC100
   n/a NFV_FusionSphere Version: 6.5.1.SPC23
Version: 8.0.0.SPC12
   n/a SMC2.0 Version: V600R019C00
Version: V600R019C10
   n/a iMaster MAE-M Version: MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T18:37:18.487Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ManageOne",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "6.5.0"
            },
            {
              "status": "affected",
              "version": "6.5.0.SPC100.B210"
            },
            {
              "status": "affected",
              "version": "6.5.1.1.B010"
            },
            {
              "status": "affected",
              "version": "6.5.1.1.B020"
            },
            {
              "status": "affected",
              "version": "6.5.1.1.B030"
            },
            {
              "status": "affected",
              "version": "6.5.1.1.B040"
            },
            {
              "status": "affected",
              "version": "6.5.1.SPC100.B050"
            },
            {
              "status": "affected",
              "version": "6.5.1.SPC101.B010"
            },
            {
              "status": "affected",
              "version": "6.5.1.SPC101.B040"
            },
            {
              "status": "affected",
              "version": "6.5.1.SPC200"
            },
            {
              "status": "affected",
              "version": "6.5.1.SPC200.B010"
            },
            {
              "status": "affected",
              "version": "6.5.1.SPC200.B030"
            },
            {
              "status": "affected",
              "version": "6.5.1.SPC200.B040"
            },
            {
              "status": "affected",
              "version": "6.5.1.SPC200.B050"
            },
            {
              "status": "affected",
              "version": "6.5.1.SPC200.B060"
            },
            {
              "status": "affected",
              "version": "6.5.1.SPC200.B070"
            },
            {
              "status": "affected",
              "version": "6.5.1RC1.B060"
            },
            {
              "status": "affected",
              "version": "6.5.1RC2.B020"
            },
            {
              "status": "affected",
              "version": "6.5.1RC2.B030"
            },
            {
              "status": "affected",
              "version": "6.5.1RC2.B040"
            },
            {
              "status": "affected",
              "version": "6.5.1RC2.B050"
            },
            {
              "status": "affected",
              "version": "6.5.1RC2.B060"
            },
            {
              "status": "affected",
              "version": "6.5.1RC2.B070"
            },
            {
              "status": "affected",
              "version": "6.5.1RC2.B080"
            },
            {
              "status": "affected",
              "version": "6.5.1RC2.B090"
            },
            {
              "status": "affected",
              "version": "6.5.RC2.B050"
            },
            {
              "status": "affected",
              "version": "8.0.0"
            },
            {
              "status": "affected",
              "version": "8.0.0-LCND81"
            },
            {
              "status": "affected",
              "version": "8.0.0.SPC100"
            },
            {
              "status": "affected",
              "version": "8.0.1"
            },
            {
              "status": "affected",
              "version": "8.0.RC2"
            },
            {
              "status": "affected",
              "version": "8.0.RC3"
            },
            {
              "status": "affected",
              "version": "8.0.RC3.B041"
            },
            {
              "status": "affected",
              "version": "8.0.RC3.SPC100"
            }
          ]
        },
        {
          "product": "NFV_FusionSphere",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "6.5.1.SPC23"
            },
            {
              "status": "affected",
              "version": "8.0.0.SPC12"
            }
          ]
        },
        {
          "product": "SMC2.0",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "V600R019C00"
            },
            {
              "status": "affected",
              "version": "V600R019C10"
            }
          ]
        },
        {
          "product": "iMaster MAE-M",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Local Privilege Escalation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-06T01:53:36",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2021-22299",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ManageOne",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "6.5.0"
                          },
                          {
                            "version_value": "6.5.0.SPC100.B210"
                          },
                          {
                            "version_value": "6.5.1.1.B010"
                          },
                          {
                            "version_value": "6.5.1.1.B020"
                          },
                          {
                            "version_value": "6.5.1.1.B030"
                          },
                          {
                            "version_value": "6.5.1.1.B040"
                          },
                          {
                            "version_value": "6.5.1.SPC100.B050"
                          },
                          {
                            "version_value": "6.5.1.SPC101.B010"
                          },
                          {
                            "version_value": "6.5.1.SPC101.B040"
                          },
                          {
                            "version_value": "6.5.1.SPC200"
                          },
                          {
                            "version_value": "6.5.1.SPC200.B010"
                          },
                          {
                            "version_value": "6.5.1.SPC200.B030"
                          },
                          {
                            "version_value": "6.5.1.SPC200.B040"
                          },
                          {
                            "version_value": "6.5.1.SPC200.B050"
                          },
                          {
                            "version_value": "6.5.1.SPC200.B060"
                          },
                          {
                            "version_value": "6.5.1.SPC200.B070"
                          },
                          {
                            "version_value": "6.5.1RC1.B060"
                          },
                          {
                            "version_value": "6.5.1RC2.B020"
                          },
                          {
                            "version_value": "6.5.1RC2.B030"
                          },
                          {
                            "version_value": "6.5.1RC2.B040"
                          },
                          {
                            "version_value": "6.5.1RC2.B050"
                          },
                          {
                            "version_value": "6.5.1RC2.B060"
                          },
                          {
                            "version_value": "6.5.1RC2.B070"
                          },
                          {
                            "version_value": "6.5.1RC2.B080"
                          },
                          {
                            "version_value": "6.5.1RC2.B090"
                          },
                          {
                            "version_value": "6.5.RC2.B050"
                          },
                          {
                            "version_value": "8.0.0"
                          },
                          {
                            "version_value": "8.0.0-LCND81"
                          },
                          {
                            "version_value": "8.0.0.SPC100"
                          },
                          {
                            "version_value": "8.0.1"
                          },
                          {
                            "version_value": "8.0.RC2"
                          },
                          {
                            "version_value": "8.0.RC3"
                          },
                          {
                            "version_value": "8.0.RC3.B041"
                          },
                          {
                            "version_value": "8.0.RC3.SPC100"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NFV_FusionSphere",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "6.5.1.SPC23"
                          },
                          {
                            "version_value": "8.0.0.SPC12"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SMC2.0",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V600R019C00"
                          },
                          {
                            "version_value": "V600R019C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "iMaster MAE-M",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Local Privilege Escalation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2021-22299",
    "datePublished": "2021-02-06T01:53:36",
    "dateReserved": "2021-01-05T00:00:00",
    "dateUpdated": "2024-08-03T18:37:18.487Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-19416
Vulnerability from cvelistv5
Published
2020-07-08 16:55
Modified
2024-08-05 02:16
Severity ?
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
Impacted products
Vendor Product Version
Huawei AR120-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20 V200R008C30
Create a notification for this product.
   Huawei AR1200 Version: V200R006C10
Version: V200R007C00
Version: V200R008C20 V200R008C30
Create a notification for this product.
   Huawei AR1200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR150 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR150-S Version: V200R006C10SPC300
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR160 Version: V200R006C10
Version: V200R006C12
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR200 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR2200 Version: V200R006C10
Version: V200R006C13
Version: V200R006C16PWE
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR2200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR3200 Version: V200R006C10
Version: V200R006C11
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C00
Version: V200R008C10
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR3600 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R008C20
Create a notification for this product.
   Huawei AR510 Version: V200R006C10
Version: V200R006C12
Version: V200R006C13
Version: V200R006C15
Version: V200R006C16
Version: V200R006C17
Version: V200R007C00SPC180T
Version: V200R007C00SPC600
Version: V200R007C00SPC900
Version: V200R007C00SPCb00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei DP300 Version: V500R002C00
Create a notification for this product.
   Huawei IPS Module Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NGFW Module Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R002C00
Version: V500R002C10
Create a notification for this product.
   Huawei NIP6300 Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NIP6600 Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NIP6800 Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NetEngine16EX Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei RSE6500 Version: V500R002C00
Create a notification for this product.
   Huawei SMC2.0 Version: V100R003C00SPC200T
Version: V100R003C00SPC300T
Version: V100R003C00SPC301T
Version: V100R003C10
Version: V100R005C00SPC100
Version: V100R005C00SPC101B001T
Version: V100R005C00SPC102
Version: V100R005C00SPC103
Version: V100R005C00SPC200
Version: V100R005C00SPC201T
Version: V500R002C00
Version: V600R006C00
Create a notification for this product.
   Huawei SRG1300 Version: V200R006C10
Version: V200R007C00
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SRG2300 Version: V200R006C10
Version: V200R007C00
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SRG3300 Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SVN5600 Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SVN5800 Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SVN5800-C Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SeMG9811 Version: V300R001C01SPC500
Version: V300R001C01SPC500T
Version: V300R001C01SPC700
Version: V300R001C01SPCa00
Create a notification for this product.
   Huawei Secospace USG6300 Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei Secospace USG6500 Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei Secospace USG6600 Version: V100R001C00
Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei SoftCo Version: V200R001C01SPC300
Version: V200R001C01SPC400
Version: V200R001C01SPC500
Version: V200R001C01SPC600
Version: V200R001C01SPH703
Version: V200R003C00SPC100
Version: V200R003C00SPC200
Version: V200R003C00SPC300
Version: V200R003C00SPC500
Version: V200R003C20
Create a notification for this product.
   Huawei TE30 Version: V100R001C02SPC100
Version: V100R001C02SPC200 V100R001C10
Version: V500R002C00SPC200
Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC900
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE40 Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC900
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE50 Version: V500R002C00SPC600
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE60 Version: V100R001C01SPC100
Version: V100R001C10
Version: V100R001C10SPC300
Version: V100R001C10SPC400
Version: V100R001C10SPC500
Version: V100R001C10SPC600
Version: V100R001C10SPC800
Version: V100R003C00
Version: V500R002C00
Version: V500R002C00SPC100
Version: V500R002C00SPC200
Version: V500R002C00SPC300
Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC800
Version: V500R002C00SPC900
Version: V500R002C00SPCa00
Version: V500R002C00SPCb00
Version: V600R006C00
Version: V600R006C00SPC200
Create a notification for this product.
   Huawei TP3206 Version: V100R002C00
Create a notification for this product.
   Huawei USG9500 Version: V300R001C01
Version: V300R001C20
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei USG9520 Version: V300R001C01SPC800PWE
Create a notification for this product.
   Huawei USG9560 Version: V300R001C20SPC300
Create a notification for this product.
   Huawei VP9660 Version: V200R001C02SPC100
Version: V200R001C02SPC200
Version: V200R001C02SPC300
Version: V200R001C02SPC300T
Version: V200R001C02SPC400
Version: V200R001C30SPC100
Version: V200R001C30SPC100B015T
Version: V200R001C30SPC101
Version: V200R001C30SPC101TB015
Version: V200R001C30SPC102T
Version: V200R001C30SPC103T
Version: V200R001C30SPC104T
Version: V200R001C30SPC200
Version: V200R001C30SPC200B022T
Version: V200R001C30SPC201B023T
Version: V200R001C30SPC202B025T
Version: V200R001C30SPC203T
Version: V200R001C30SPC206T
Version: V200R001C30SPC207T
Version: V200R001C30SPC208T
Version: V200R001C30SPC209T
Version: V200R001C30SPC300
Version: V200R001C30SPC400
Version: V200R001C30SPC400B001
Version: V200R001C30SPC400T
Version: V200R001C30SPC401T
Version: V200R001C30SPC402T
Version: V200R001C30SPC403T
Version: V200R001C30SPC404T
Version: V200R001C30SPC405T
Version: V200R001C30SPC600
Version: V200R001C30SPC700
Version: V200R001C30SPC700T
Version: V200R001C30SPC701T
Version: V200R001C30SPC702T
Version: V200R001C30SPC703T
Version: V200R001C30SPC800
Version: V200R001C30SPC800T
Version: V200R001C30SPC900
Version: V200R001C30SPCa00
Version: V200R001C30SPCa00T
Version: V200R001C30SPCa01
Version: V200R001C30SPCa01T
Version: V200R001C30SPCa02T
Version: V200R001C30SPCb00
Version: V200R001C30SPCc00
Version: V200R001C30SPCd00
Version: V200R001C30SPCd00T
Version: V200R001C30SPCd01T
Version: V200R001C30SPCd
Create a notification for this product.
   Huawei ViewPoint 8660 Version: V100R008C03B013SP02
Version: V100R008C03B013SP03
Version: V100R008C03B013SP04
Version: V100R008C03SPC100
Version: V100R008C03SPC200
Version: V100R008C03SPC300
Version: V100R008C03SPC400
Version: V100R008C03SPC500
Version: V100R008C03SPC600
Version: V100R008C03SPC700
Version: V100R008C03SPC800
Version: V100R008C03SPC900
Version: V100R008C03SPCa00
Version: V100R008C03SPCb00
Version: V100R008C03SPCc00
Create a notification for this product.
   Huawei ViewPoint 9030 Version: V100R011C02SPC100
Version: V100R011C03B012SP15
Version: V100R011C03B012SP16
Version: V100R011C03B015SP03
Version: V100R011C03LGWL01SPC100
Version: V100R011C03LGWL01SPC100B012
Version: V100R011C03SPC100
Version: V100R011C03SPC200
Version: V100R011C03SPC300
Version: V100R011C03SPC400
Version: V100R011C03SPC500
Create a notification for this product.
   Huawei eSpace U1910 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1911 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1930 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1960 Version: V100R001C01SPC500
Version: V100R001C20LCRW01T
Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC600
Version: V100R001C20SPC600T
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1980 Version: V100R001C01SPC500T
Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500T
Version: V100R001C20SPC502
Version: V100R001C20SPC600
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1981 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPC700
Version: V100R001C20SPH702
Version: V100R001C20SPH703
Version: V100R001C30
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T02:16:47.115Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20 V200R008C30"
            }
          ]
        },
        {
          "product": "AR1200",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20 V200R008C30"
            }
          ]
        },
        {
          "product": "AR1200-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR150",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR150-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10SPC300"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR160",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R006C12"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR200",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR200-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR2200",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R006C13"
            },
            {
              "status": "affected",
              "version": "V200R006C16PWE"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR2200-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR3200",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R006C11"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C00"
            },
            {
              "status": "affected",
              "version": "V200R008C10"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR3600",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            }
          ]
        },
        {
          "product": "AR510",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R006C12"
            },
            {
              "status": "affected",
              "version": "V200R006C13"
            },
            {
              "status": "affected",
              "version": "V200R006C15"
            },
            {
              "status": "affected",
              "version": "V200R006C16"
            },
            {
              "status": "affected",
              "version": "V200R006C17"
            },
            {
              "status": "affected",
              "version": "V200R007C00SPC180T"
            },
            {
              "status": "affected",
              "version": "V200R007C00SPC600"
            },
            {
              "status": "affected",
              "version": "V200R007C00SPC900"
            },
            {
              "status": "affected",
              "version": "V200R007C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "DP300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R002C00"
            }
          ]
        },
        {
          "product": "IPS Module",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "NGFW Module",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R002C00"
            },
            {
              "status": "affected",
              "version": "V500R002C10"
            }
          ]
        },
        {
          "product": "NIP6300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "NIP6600",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "NIP6800",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "NetEngine16EX",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "RSE6500",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R002C00"
            }
          ]
        },
        {
          "product": "SMC2.0",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R003C00SPC200T"
            },
            {
              "status": "affected",
              "version": "V100R003C00SPC300T"
            },
            {
              "status": "affected",
              "version": "V100R003C00SPC301T"
            },
            {
              "status": "affected",
              "version": "V100R003C10"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC100"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC101B001T"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC102"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC103"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC200"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC201T"
            },
            {
              "status": "affected",
              "version": "V500R002C00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            }
          ]
        },
        {
          "product": "SRG1300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "SRG2300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "SRG3300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "SVN5600",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C10"
            }
          ]
        },
        {
          "product": "SVN5800",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C10"
            }
          ]
        },
        {
          "product": "SVN5800-C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C10"
            }
          ]
        },
        {
          "product": "SeMG9811",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V300R001C01SPC500"
            },
            {
              "status": "affected",
              "version": "V300R001C01SPC500T"
            },
            {
              "status": "affected",
              "version": "V300R001C01SPC700"
            },
            {
              "status": "affected",
              "version": "V300R001C01SPCa00"
            }
          ]
        },
        {
          "product": "Secospace USG6300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "Secospace USG6500",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "Secospace USG6600",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C00"
            },
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "SoftCo",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R001C01SPC300"
            },
            {
              "status": "affected",
              "version": "V200R001C01SPC400"
            },
            {
              "status": "affected",
              "version": "V200R001C01SPC500"
            },
            {
              "status": "affected",
              "version": "V200R001C01SPC600"
            },
            {
              "status": "affected",
              "version": "V200R001C01SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00SPC100"
            },
            {
              "status": "affected",
              "version": "V200R003C00SPC200"
            },
            {
              "status": "affected",
              "version": "V200R003C00SPC300"
            },
            {
              "status": "affected",
              "version": "V200R003C00SPC500"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            }
          ]
        },
        {
          "product": "TE30",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C02SPC100"
            },
            {
              "status": "affected",
              "version": "V100R001C02SPC200 V100R001C10"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC200"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC600"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC700"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC900"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            }
          ]
        },
        {
          "product": "TE40",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R002C00SPC600"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC700"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC900"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            }
          ]
        },
        {
          "product": "TE50",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R002C00SPC600"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            }
          ]
        },
        {
          "product": "TE60",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C01SPC100"
            },
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC800"
            },
            {
              "status": "affected",
              "version": "V100R003C00"
            },
            {
              "status": "affected",
              "version": "V500R002C00"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC100"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC200"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC300"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC600"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC700"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC800"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC900"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCa00"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            },
            {
              "status": "affected",
              "version": "V600R006C00SPC200"
            }
          ]
        },
        {
          "product": "TP3206",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R002C00"
            }
          ]
        },
        {
          "product": "USG9500",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V300R001C01"
            },
            {
              "status": "affected",
              "version": "V300R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "USG9520",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V300R001C01SPC800PWE"
            }
          ]
        },
        {
          "product": "USG9560",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V300R001C20SPC300"
            }
          ]
        },
        {
          "product": "VP9660",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R001C02SPC100"
            },
            {
              "status": "affected",
              "version": "V200R001C02SPC200"
            },
            {
              "status": "affected",
              "version": "V200R001C02SPC300"
            },
            {
              "status": "affected",
              "version": "V200R001C02SPC300T"
            },
            {
              "status": "affected",
              "version": "V200R001C02SPC400"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC100"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC100B015T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC101"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC101TB015"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC102T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC103T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC104T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC200"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC200B022T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC201B023T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC202B025T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC203T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC206T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC207T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC208T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC209T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC300"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC400"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC400B001"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC400T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC401T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC402T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC403T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC404T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC405T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC600"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC700"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC700T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC701T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC702T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC703T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC800"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC800T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC900"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa00"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa00T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa01"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa01T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa02T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCb00"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCc00"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCd00"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCd00T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCd01T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCd"
            }
          ]
        },
        {
          "product": "ViewPoint 8660",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R008C03B013SP02"
            },
            {
              "status": "affected",
              "version": "V100R008C03B013SP03"
            },
            {
              "status": "affected",
              "version": "V100R008C03B013SP04"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC100"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC200"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC300"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC400"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC500"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC600"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC700"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC800"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC900"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPCa00"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPCb00"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPCc00"
            }
          ]
        },
        {
          "product": "ViewPoint 9030",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R011C02SPC100"
            },
            {
              "status": "affected",
              "version": "V100R011C03B012SP15"
            },
            {
              "status": "affected",
              "version": "V100R011C03B012SP16"
            },
            {
              "status": "affected",
              "version": "V100R011C03B015SP03"
            },
            {
              "status": "affected",
              "version": "V100R011C03LGWL01SPC100"
            },
            {
              "status": "affected",
              "version": "V100R011C03LGWL01SPC100B012"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC100"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC200"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC300"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC400"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC500"
            }
          ]
        },
        {
          "product": "eSpace U1910",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1911",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH309"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1930",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1960",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C01SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20LCRW01T"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600T"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH309"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1980",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C01SPC500T"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500T"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC502"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH309"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1981",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC700"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH702"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "DoS",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-08T16:55:48",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-19416",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20 V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR1200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20 V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR1200-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR150",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR150-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10SPC300"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR160",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R006C12"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR200-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR2200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R006C13"
                          },
                          {
                            "version_value": "V200R006C16PWE"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR2200-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR3200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R006C11"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C00"
                          },
                          {
                            "version_value": "V200R008C10"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR3600",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R008C20"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR510",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R006C12"
                          },
                          {
                            "version_value": "V200R006C13"
                          },
                          {
                            "version_value": "V200R006C15"
                          },
                          {
                            "version_value": "V200R006C16"
                          },
                          {
                            "version_value": "V200R006C17"
                          },
                          {
                            "version_value": "V200R007C00SPC180T"
                          },
                          {
                            "version_value": "V200R007C00SPC600"
                          },
                          {
                            "version_value": "V200R007C00SPC900"
                          },
                          {
                            "version_value": "V200R007C00SPCb00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "DP300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R002C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "IPS Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NGFW Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R002C00"
                          },
                          {
                            "version_value": "V500R002C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NIP6300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NIP6600",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NIP6800",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "NetEngine16EX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RSE6500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R002C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SMC2.0",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R003C00SPC200T"
                          },
                          {
                            "version_value": "V100R003C00SPC300T"
                          },
                          {
                            "version_value": "V100R003C00SPC301T"
                          },
                          {
                            "version_value": "V100R003C10"
                          },
                          {
                            "version_value": "V100R005C00SPC100"
                          },
                          {
                            "version_value": "V100R005C00SPC101B001T"
                          },
                          {
                            "version_value": "V100R005C00SPC102"
                          },
                          {
                            "version_value": "V100R005C00SPC103"
                          },
                          {
                            "version_value": "V100R005C00SPC200"
                          },
                          {
                            "version_value": "V100R005C00SPC201T"
                          },
                          {
                            "version_value": "V500R002C00"
                          },
                          {
                            "version_value": "V600R006C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SRG1300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SRG2300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SRG3300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SVN5600",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SVN5800",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SVN5800-C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SeMG9811",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V300R001C01SPC500"
                          },
                          {
                            "version_value": "V300R001C01SPC500T"
                          },
                          {
                            "version_value": "V300R001C01SPC700"
                          },
                          {
                            "version_value": "V300R001C01SPCa00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Secospace USG6300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Secospace USG6500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Secospace USG6600",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C00"
                          },
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SoftCo",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R001C01SPC300"
                          },
                          {
                            "version_value": "V200R001C01SPC400"
                          },
                          {
                            "version_value": "V200R001C01SPC500"
                          },
                          {
                            "version_value": "V200R001C01SPC600"
                          },
                          {
                            "version_value": "V200R001C01SPH703"
                          },
                          {
                            "version_value": "V200R003C00SPC100"
                          },
                          {
                            "version_value": "V200R003C00SPC200"
                          },
                          {
                            "version_value": "V200R003C00SPC300"
                          },
                          {
                            "version_value": "V200R003C00SPC500"
                          },
                          {
                            "version_value": "V200R003C20"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TE30",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C02SPC100"
                          },
                          {
                            "version_value": "V100R001C02SPC200 V100R001C10"
                          },
                          {
                            "version_value": "V500R002C00SPC200"
                          },
                          {
                            "version_value": "V500R002C00SPC600"
                          },
                          {
                            "version_value": "V500R002C00SPC700"
                          },
                          {
                            "version_value": "V500R002C00SPC900"
                          },
                          {
                            "version_value": "V500R002C00SPCb00"
                          },
                          {
                            "version_value": "V600R006C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TE40",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R002C00SPC600"
                          },
                          {
                            "version_value": "V500R002C00SPC700"
                          },
                          {
                            "version_value": "V500R002C00SPC900"
                          },
                          {
                            "version_value": "V500R002C00SPCb00"
                          },
                          {
                            "version_value": "V600R006C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TE50",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R002C00SPC600"
                          },
                          {
                            "version_value": "V500R002C00SPCb00"
                          },
                          {
                            "version_value": "V600R006C00"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TE60",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C01SPC100"
                          },
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C10SPC300"
                          },
                          {
                            "version_value": "V100R001C10SPC400"
                          },
                          {
                            "version_value": "V100R001C10SPC500"
                          },
                          {
                            "version_value": "V100R001C10SPC600"
                          },
                          {
                            "version_value": "V100R001C10SPC800"
                          },
                          {
                            "version_value": "V100R003C00"
                          },
                          {
                            "version_value": "V500R002C00"
                          },
                          {
                            "version_value": "V500R002C00SPC100"
                          },
                          {
                            "version_value": "V500R002C00SPC200"
                          },
                          {
                            "version_value": "V500R002C00SPC300"
                          },
                          {
                            "version_value": "V500R002C00SPC600"
                          },
                          {
                            "version_value": "V500R002C00SPC700"
                          },
                          {
                            "version_value": "V500R002C00SPC800"
                          },
                          {
                            "version_value": "V500R002C00SPC900"
                          },
                          {
                            "version_value": "V500R002C00SPCa00"
                          },
                          {
                            "version_value": "V500R002C00SPCb00"
                          },
                          {
                            "version_value": "V600R006C00"
                          },
                          {
                            "version_value": "V600R006C00SPC200"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TP3206",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R002C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "USG9500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V300R001C01"
                          },
                          {
                            "version_value": "V300R001C20"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "USG9520",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V300R001C01SPC800PWE"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "USG9560",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V300R001C20SPC300"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VP9660",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R001C02SPC100"
                          },
                          {
                            "version_value": "V200R001C02SPC200"
                          },
                          {
                            "version_value": "V200R001C02SPC300"
                          },
                          {
                            "version_value": "V200R001C02SPC300T"
                          },
                          {
                            "version_value": "V200R001C02SPC400"
                          },
                          {
                            "version_value": "V200R001C30SPC100"
                          },
                          {
                            "version_value": "V200R001C30SPC100B015T"
                          },
                          {
                            "version_value": "V200R001C30SPC101"
                          },
                          {
                            "version_value": "V200R001C30SPC101TB015"
                          },
                          {
                            "version_value": "V200R001C30SPC102T"
                          },
                          {
                            "version_value": "V200R001C30SPC103T"
                          },
                          {
                            "version_value": "V200R001C30SPC104T"
                          },
                          {
                            "version_value": "V200R001C30SPC200"
                          },
                          {
                            "version_value": "V200R001C30SPC200B022T"
                          },
                          {
                            "version_value": "V200R001C30SPC201B023T"
                          },
                          {
                            "version_value": "V200R001C30SPC202B025T"
                          },
                          {
                            "version_value": "V200R001C30SPC203T"
                          },
                          {
                            "version_value": "V200R001C30SPC206T"
                          },
                          {
                            "version_value": "V200R001C30SPC207T"
                          },
                          {
                            "version_value": "V200R001C30SPC208T"
                          },
                          {
                            "version_value": "V200R001C30SPC209T"
                          },
                          {
                            "version_value": "V200R001C30SPC300"
                          },
                          {
                            "version_value": "V200R001C30SPC400"
                          },
                          {
                            "version_value": "V200R001C30SPC400B001"
                          },
                          {
                            "version_value": "V200R001C30SPC400T"
                          },
                          {
                            "version_value": "V200R001C30SPC401T"
                          },
                          {
                            "version_value": "V200R001C30SPC402T"
                          },
                          {
                            "version_value": "V200R001C30SPC403T"
                          },
                          {
                            "version_value": "V200R001C30SPC404T"
                          },
                          {
                            "version_value": "V200R001C30SPC405T"
                          },
                          {
                            "version_value": "V200R001C30SPC600"
                          },
                          {
                            "version_value": "V200R001C30SPC700"
                          },
                          {
                            "version_value": "V200R001C30SPC700T"
                          },
                          {
                            "version_value": "V200R001C30SPC701T"
                          },
                          {
                            "version_value": "V200R001C30SPC702T"
                          },
                          {
                            "version_value": "V200R001C30SPC703T"
                          },
                          {
                            "version_value": "V200R001C30SPC800"
                          },
                          {
                            "version_value": "V200R001C30SPC800T"
                          },
                          {
                            "version_value": "V200R001C30SPC900"
                          },
                          {
                            "version_value": "V200R001C30SPCa00"
                          },
                          {
                            "version_value": "V200R001C30SPCa00T"
                          },
                          {
                            "version_value": "V200R001C30SPCa01"
                          },
                          {
                            "version_value": "V200R001C30SPCa01T"
                          },
                          {
                            "version_value": "V200R001C30SPCa02T"
                          },
                          {
                            "version_value": "V200R001C30SPCb00"
                          },
                          {
                            "version_value": "V200R001C30SPCc00"
                          },
                          {
                            "version_value": "V200R001C30SPCd00"
                          },
                          {
                            "version_value": "V200R001C30SPCd00T"
                          },
                          {
                            "version_value": "V200R001C30SPCd01T"
                          },
                          {
                            "version_value": "V200R001C30SPCd"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ViewPoint 8660",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R008C03B013SP02"
                          },
                          {
                            "version_value": "V100R008C03B013SP03"
                          },
                          {
                            "version_value": "V100R008C03B013SP04"
                          },
                          {
                            "version_value": "V100R008C03SPC100"
                          },
                          {
                            "version_value": "V100R008C03SPC200"
                          },
                          {
                            "version_value": "V100R008C03SPC300"
                          },
                          {
                            "version_value": "V100R008C03SPC400"
                          },
                          {
                            "version_value": "V100R008C03SPC500"
                          },
                          {
                            "version_value": "V100R008C03SPC600"
                          },
                          {
                            "version_value": "V100R008C03SPC700"
                          },
                          {
                            "version_value": "V100R008C03SPC800"
                          },
                          {
                            "version_value": "V100R008C03SPC900"
                          },
                          {
                            "version_value": "V100R008C03SPCa00"
                          },
                          {
                            "version_value": "V100R008C03SPCb00"
                          },
                          {
                            "version_value": "V100R008C03SPCc00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ViewPoint 9030",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R011C02SPC100"
                          },
                          {
                            "version_value": "V100R011C03B012SP15"
                          },
                          {
                            "version_value": "V100R011C03B012SP16"
                          },
                          {
                            "version_value": "V100R011C03B015SP03"
                          },
                          {
                            "version_value": "V100R011C03LGWL01SPC100"
                          },
                          {
                            "version_value": "V100R011C03LGWL01SPC100B012"
                          },
                          {
                            "version_value": "V100R011C03SPC100"
                          },
                          {
                            "version_value": "V100R011C03SPC200"
                          },
                          {
                            "version_value": "V100R011C03SPC300"
                          },
                          {
                            "version_value": "V100R011C03SPC400"
                          },
                          {
                            "version_value": "V100R011C03SPC500"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1910",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1911",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPH309"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1930",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "eSpace U1960",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C01SPC500"
                          },
                          {
                            "version_value": "V100R001C20LCRW01T"
                          },
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPC600T"
                          },
                          {
                            "version_value": "V100R001C20SPH309"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1980",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C01SPC500T"
                          },
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500T"
                          },
                          {
                            "version_value": "V100R001C20SPC502"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPH309"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1981",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPC700"
                          },
                          {
                            "version_value": "V100R001C20SPH702"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "DoS"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-19416",
    "datePublished": "2020-07-08T16:55:48",
    "dateReserved": "2019-11-29T00:00:00",
    "dateUpdated": "2024-08-05T02:16:47.115Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-17301
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:51
Severity ?
Summary
Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01, V300R001C00 have a weak cryptography vulnerability. Due to not properly some values in the certificates, an unauthenticated remote attacker could forges a specific RSA certificate and exploits the vulnerability to pass identity authentication and logs into the target device to obtain permissions configured for the specific user name.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S,AR1200,AR1200-S,AR150,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,CloudEngine 12800,CloudEngine 5800,CloudEngine 6800,CloudEngine 7800,DP300,SMC2.0,SRG1300,SRG2300,SRG3300,TE30,TE60,VP9660,ViewPoint 8660,eSpace IAD,eSpace U1981,eSpace USM Version: AR120-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEn ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T20:51:30.593Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S,AR1200,AR1200-S,AR150,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,CloudEngine 12800,CloudEngine 5800,CloudEngine 6800,CloudEngine 7800,DP300,SMC2.0,SRG1300,SRG2300,SRG3300,TE30,TE60,VP9660,ViewPoint 8660,eSpace IAD,eSpace U1981,eSpace USM",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "AR120-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEn ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2017-12-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01, V300R001C00 have a weak cryptography vulnerability. Due to not properly some values in the certificates, an unauthenticated remote attacker could forges a specific RSA certificate and exploits the vulnerability to pass identity authentication and logs into the target device to obtain permissions configured for the specific user name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "weak cryptography",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-15T15:57:02",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2017-17301",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S,AR1200,AR1200-S,AR150,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,CloudEngine 12800,CloudEngine 5800,CloudEngine 6800,CloudEngine 7800,DP300,SMC2.0,SRG1300,SRG2300,SRG3300,TE30,TE60,VP9660,ViewPoint 8660,eSpace IAD,eSpace U1981,eSpace USM",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AR120-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300V500R002C00, SMC2.0V100R003C10, V100R005C00, V500R002C00, SRG1300V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30V100R001C10, TE60V100R003C00, V500R002C00, VP9660V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660V100R008C02, V100R008C03, eSpace IADV300R002C01, eSpace U1981V200R003C20, V200R003C30, eSpace USMV100R001C01, V300R001C00"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01, V300R001C00 have a weak cryptography vulnerability. Due to not properly some values in the certificates, an unauthenticated remote attacker could forges a specific RSA certificate and exploits the vulnerability to pass identity authentication and logs into the target device to obtain permissions configured for the specific user name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "weak cryptography"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-17301",
    "datePublished": "2018-02-15T16:00:00",
    "dateReserved": "2017-12-04T00:00:00",
    "dateUpdated": "2024-08-05T20:51:30.593Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-19417
Vulnerability from cvelistv5
Published
2020-07-08 16:53
Modified
2024-08-05 02:16
Severity ?
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
Impacted products
Vendor Product Version
Huawei AR120-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20 V200R008C30
Create a notification for this product.
   Huawei AR1200 Version: V200R006C10
Version: V200R007C00
Version: V200R008C20 V200R008C30
Create a notification for this product.
   Huawei AR1200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR150 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR150-S Version: V200R006C10SPC300
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR160 Version: V200R006C10
Version: V200R006C12
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR200 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR2200 Version: V200R006C10
Version: V200R006C13
Version: V200R006C16PWE
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR2200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR3200 Version: V200R006C10
Version: V200R006C11
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C00
Version: V200R008C10
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR3600 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R008C20
Create a notification for this product.
   Huawei AR510 Version: V200R006C10
Version: V200R006C12
Version: V200R006C13
Version: V200R006C15
Version: V200R006C16
Version: V200R006C17
Version: V200R007C00SPC180T
Version: V200R007C00SPC600
Version: V200R007C00SPC900
Version: V200R007C00SPCb00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei DP300 Version: V500R002C00
Create a notification for this product.
   Huawei IPS Module Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NGFW Module Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R002C00
Version: V500R002C10
Create a notification for this product.
   Huawei NIP6300 Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NIP6600 Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NIP6800 Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NetEngine16EX Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei RSE6500 Version: V500R002C00
Create a notification for this product.
   Huawei SMC2.0 Version: V100R003C00SPC200T
Version: V100R003C00SPC300T
Version: V100R003C00SPC301T
Version: V100R003C10
Version: V100R005C00SPC100
Version: V100R005C00SPC101B001T
Version: V100R005C00SPC102
Version: V100R005C00SPC103
Version: V100R005C00SPC200
Version: V100R005C00SPC201T
Version: V500R002C00
Version: V600R006C00
Create a notification for this product.
   Huawei SRG1300 Version: V200R006C10
Version: V200R007C00
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SRG2300 Version: V200R006C10
Version: V200R007C00
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SRG3300 Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SVN5600 Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SVN5800 Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SVN5800-C Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SeMG9811 Version: V300R001C01SPC500
Version: V300R001C01SPC500T
Version: V300R001C01SPC700
Version: V300R001C01SPCa00
Create a notification for this product.
   Huawei Secospace USG6300 Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei Secospace USG6500 Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei Secospace USG6600 Version: V100R001C00
Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei SoftCo Version: V200R001C01SPC300
Version: V200R001C01SPC400
Version: V200R001C01SPC500
Version: V200R001C01SPC600
Version: V200R001C01SPH703
Version: V200R003C00SPC100
Version: V200R003C00SPC200
Version: V200R003C00SPC300
Version: V200R003C00SPC500
Version: V200R003C20
Create a notification for this product.
   Huawei TE30 Version: V100R001C02SPC100
Version: V100R001C02SPC200 V100R001C10
Version: V500R002C00SPC200
Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC900
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE40 Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC900
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE50 Version: V500R002C00SPC600
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE60 Version: V100R001C01SPC100
Version: V100R001C10
Version: V100R001C10SPC300
Version: V100R001C10SPC400
Version: V100R001C10SPC500
Version: V100R001C10SPC600
Version: V100R001C10SPC800
Version: V100R003C00
Version: V500R002C00
Version: V500R002C00SPC100
Version: V500R002C00SPC200
Version: V500R002C00SPC300
Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC800
Version: V500R002C00SPC900
Version: V500R002C00SPCa00
Version: V500R002C00SPCb00
Version: V600R006C00
Version: V600R006C00SPC200
Create a notification for this product.
   Huawei TP3206 Version: V100R002C00
Create a notification for this product.
   Huawei USG9500 Version: V300R001C01
Version: V300R001C20
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei USG9520 Version: V300R001C01SPC800PWE
Create a notification for this product.
   Huawei USG9560 Version: V300R001C20SPC300
Create a notification for this product.
   Huawei VP9660 Version: V200R001C02SPC100
Version: V200R001C02SPC200
Version: V200R001C02SPC300
Version: V200R001C02SPC300T
Version: V200R001C02SPC400
Version: V200R001C30SPC100
Version: V200R001C30SPC100B015T
Version: V200R001C30SPC101
Version: V200R001C30SPC101TB015
Version: V200R001C30SPC102T
Version: V200R001C30SPC103T
Version: V200R001C30SPC104T
Version: V200R001C30SPC200
Version: V200R001C30SPC200B022T
Version: V200R001C30SPC201B023T
Version: V200R001C30SPC202B025T
Version: V200R001C30SPC203T
Version: V200R001C30SPC206T
Version: V200R001C30SPC207T
Version: V200R001C30SPC208T
Version: V200R001C30SPC209T
Version: V200R001C30SPC300
Version: V200R001C30SPC400
Version: V200R001C30SPC400B001
Version: V200R001C30SPC400T
Version: V200R001C30SPC401T
Version: V200R001C30SPC402T
Version: V200R001C30SPC403T
Version: V200R001C30SPC404T
Version: V200R001C30SPC405T
Version: V200R001C30SPC600
Version: V200R001C30SPC700
Version: V200R001C30SPC700T
Version: V200R001C30SPC701T
Version: V200R001C30SPC702T
Version: V200R001C30SPC703T
Version: V200R001C30SPC800
Version: V200R001C30SPC800T
Version: V200R001C30SPC900
Version: V200R001C30SPCa00
Version: V200R001C30SPCa00T
Version: V200R001C30SPCa01
Version: V200R001C30SPCa01T
Version: V200R001C30SPCa02T
Version: V200R001C30SPCb00
Version: V200R001C30SPCc00
Version: V200R001C30SPCd00
Version: V200R001C30SPCd00T
Version: V200R001C30SPCd01T
Version: V200R001C30SPCd
Create a notification for this product.
   Huawei ViewPoint 8660 Version: V100R008C03B013SP02
Version: V100R008C03B013SP03
Version: V100R008C03B013SP04
Version: V100R008C03SPC100
Version: V100R008C03SPC200
Version: V100R008C03SPC300
Version: V100R008C03SPC400
Version: V100R008C03SPC500
Version: V100R008C03SPC600
Version: V100R008C03SPC700
Version: V100R008C03SPC800
Version: V100R008C03SPC900
Version: V100R008C03SPCa00
Version: V100R008C03SPCb00
Version: V100R008C03SPCc00
Create a notification for this product.
   Huawei ViewPoint 9030 Version: V100R011C02SPC100
Version: V100R011C03B012SP15
Version: V100R011C03B012SP16
Version: V100R011C03B015SP03
Version: V100R011C03LGWL01SPC100
Version: V100R011C03LGWL01SPC100B012
Version: V100R011C03SPC100
Version: V100R011C03SPC200
Version: V100R011C03SPC300
Version: V100R011C03SPC400
Version: V100R011C03SPC500
Create a notification for this product.
   Huawei eSpace U1910 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1911 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1930 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1960 Version: V100R001C01SPC500
Version: V100R001C20LCRW01T
Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC600
Version: V100R001C20SPC600T
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1980 Version: V100R001C01SPC500T
Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500T
Version: V100R001C20SPC502
Version: V100R001C20SPC600
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1981 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPC700
Version: V100R001C20SPH702
Version: V100R001C20SPH703
Version: V100R001C30
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T02:16:47.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20 V200R008C30"
            }
          ]
        },
        {
          "product": "AR1200",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20 V200R008C30"
            }
          ]
        },
        {
          "product": "AR1200-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR150",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR150-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10SPC300"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR160",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R006C12"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR200",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR200-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR2200",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R006C13"
            },
            {
              "status": "affected",
              "version": "V200R006C16PWE"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR2200-S",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR3200",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R006C11"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C00"
            },
            {
              "status": "affected",
              "version": "V200R008C10"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "AR3600",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C01"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            }
          ]
        },
        {
          "product": "AR510",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R006C12"
            },
            {
              "status": "affected",
              "version": "V200R006C13"
            },
            {
              "status": "affected",
              "version": "V200R006C15"
            },
            {
              "status": "affected",
              "version": "V200R006C16"
            },
            {
              "status": "affected",
              "version": "V200R006C17"
            },
            {
              "status": "affected",
              "version": "V200R007C00SPC180T"
            },
            {
              "status": "affected",
              "version": "V200R007C00SPC600"
            },
            {
              "status": "affected",
              "version": "V200R007C00SPC900"
            },
            {
              "status": "affected",
              "version": "V200R007C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "DP300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R002C00"
            }
          ]
        },
        {
          "product": "IPS Module",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "NGFW Module",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R002C00"
            },
            {
              "status": "affected",
              "version": "V500R002C10"
            }
          ]
        },
        {
          "product": "NIP6300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "NIP6600",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "NIP6800",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "NetEngine16EX",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "RSE6500",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R002C00"
            }
          ]
        },
        {
          "product": "SMC2.0",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R003C00SPC200T"
            },
            {
              "status": "affected",
              "version": "V100R003C00SPC300T"
            },
            {
              "status": "affected",
              "version": "V100R003C00SPC301T"
            },
            {
              "status": "affected",
              "version": "V100R003C10"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC100"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC101B001T"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC102"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC103"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC200"
            },
            {
              "status": "affected",
              "version": "V100R005C00SPC201T"
            },
            {
              "status": "affected",
              "version": "V500R002C00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            }
          ]
        },
        {
          "product": "SRG1300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "SRG2300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R007C02"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "SRG3300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R006C10"
            },
            {
              "status": "affected",
              "version": "V200R007C00"
            },
            {
              "status": "affected",
              "version": "V200R008C20"
            },
            {
              "status": "affected",
              "version": "V200R008C30"
            }
          ]
        },
        {
          "product": "SVN5600",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C10"
            }
          ]
        },
        {
          "product": "SVN5800",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C10"
            }
          ]
        },
        {
          "product": "SVN5800-C",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C10"
            }
          ]
        },
        {
          "product": "SeMG9811",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V300R001C01SPC500"
            },
            {
              "status": "affected",
              "version": "V300R001C01SPC500T"
            },
            {
              "status": "affected",
              "version": "V300R001C01SPC700"
            },
            {
              "status": "affected",
              "version": "V300R001C01SPCa00"
            }
          ]
        },
        {
          "product": "Secospace USG6300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "Secospace USG6500",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "Secospace USG6600",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C00"
            },
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C20"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "SoftCo",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R001C01SPC300"
            },
            {
              "status": "affected",
              "version": "V200R001C01SPC400"
            },
            {
              "status": "affected",
              "version": "V200R001C01SPC500"
            },
            {
              "status": "affected",
              "version": "V200R001C01SPC600"
            },
            {
              "status": "affected",
              "version": "V200R001C01SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00SPC100"
            },
            {
              "status": "affected",
              "version": "V200R003C00SPC200"
            },
            {
              "status": "affected",
              "version": "V200R003C00SPC300"
            },
            {
              "status": "affected",
              "version": "V200R003C00SPC500"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            }
          ]
        },
        {
          "product": "TE30",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C02SPC100"
            },
            {
              "status": "affected",
              "version": "V100R001C02SPC200 V100R001C10"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC200"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC600"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC700"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC900"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            }
          ]
        },
        {
          "product": "TE40",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R002C00SPC600"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC700"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC900"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            }
          ]
        },
        {
          "product": "TE50",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R002C00SPC600"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            }
          ]
        },
        {
          "product": "TE60",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C01SPC100"
            },
            {
              "status": "affected",
              "version": "V100R001C10"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C10SPC800"
            },
            {
              "status": "affected",
              "version": "V100R003C00"
            },
            {
              "status": "affected",
              "version": "V500R002C00"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC100"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC200"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC300"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC600"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC700"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC800"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPC900"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCa00"
            },
            {
              "status": "affected",
              "version": "V500R002C00SPCb00"
            },
            {
              "status": "affected",
              "version": "V600R006C00"
            },
            {
              "status": "affected",
              "version": "V600R006C00SPC200"
            }
          ]
        },
        {
          "product": "TP3206",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R002C00"
            }
          ]
        },
        {
          "product": "USG9500",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V300R001C01"
            },
            {
              "status": "affected",
              "version": "V300R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C00"
            },
            {
              "status": "affected",
              "version": "V500R001C20"
            },
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C50"
            }
          ]
        },
        {
          "product": "USG9520",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V300R001C01SPC800PWE"
            }
          ]
        },
        {
          "product": "USG9560",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V300R001C20SPC300"
            }
          ]
        },
        {
          "product": "VP9660",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V200R001C02SPC100"
            },
            {
              "status": "affected",
              "version": "V200R001C02SPC200"
            },
            {
              "status": "affected",
              "version": "V200R001C02SPC300"
            },
            {
              "status": "affected",
              "version": "V200R001C02SPC300T"
            },
            {
              "status": "affected",
              "version": "V200R001C02SPC400"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC100"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC100B015T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC101"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC101TB015"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC102T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC103T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC104T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC200"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC200B022T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC201B023T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC202B025T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC203T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC206T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC207T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC208T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC209T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC300"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC400"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC400B001"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC400T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC401T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC402T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC403T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC404T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC405T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC600"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC700"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC700T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC701T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC702T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC703T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC800"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC800T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPC900"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa00"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa00T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa01"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa01T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCa02T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCb00"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCc00"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCd00"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCd00T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCd01T"
            },
            {
              "status": "affected",
              "version": "V200R001C30SPCd"
            }
          ]
        },
        {
          "product": "ViewPoint 8660",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R008C03B013SP02"
            },
            {
              "status": "affected",
              "version": "V100R008C03B013SP03"
            },
            {
              "status": "affected",
              "version": "V100R008C03B013SP04"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC100"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC200"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC300"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC400"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC500"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC600"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC700"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC800"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPC900"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPCa00"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPCb00"
            },
            {
              "status": "affected",
              "version": "V100R008C03SPCc00"
            }
          ]
        },
        {
          "product": "ViewPoint 9030",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R011C02SPC100"
            },
            {
              "status": "affected",
              "version": "V100R011C03B012SP15"
            },
            {
              "status": "affected",
              "version": "V100R011C03B012SP16"
            },
            {
              "status": "affected",
              "version": "V100R011C03B015SP03"
            },
            {
              "status": "affected",
              "version": "V100R011C03LGWL01SPC100"
            },
            {
              "status": "affected",
              "version": "V100R011C03LGWL01SPC100B012"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC100"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC200"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC300"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC400"
            },
            {
              "status": "affected",
              "version": "V100R011C03SPC500"
            }
          ]
        },
        {
          "product": "eSpace U1910",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1911",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH309"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1930",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1960",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C01SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20LCRW01T"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600T"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH309"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1980",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C01SPC500T"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500T"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC502"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH309"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        },
        {
          "product": "eSpace U1981",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V100R001C20SPC300"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC400"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC500"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC600"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPC700"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH702"
            },
            {
              "status": "affected",
              "version": "V100R001C20SPH703"
            },
            {
              "status": "affected",
              "version": "V100R001C30"
            },
            {
              "status": "affected",
              "version": "V200R003C00"
            },
            {
              "status": "affected",
              "version": "V200R003C20"
            },
            {
              "status": "affected",
              "version": "V200R003C30"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "DoS",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-08T16:53:05",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-19417",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20 V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR1200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20 V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR1200-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR150",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR150-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10SPC300"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR160",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R006C12"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR200-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR2200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R006C13"
                          },
                          {
                            "version_value": "V200R006C16PWE"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR2200-S",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR3200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R006C11"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C00"
                          },
                          {
                            "version_value": "V200R008C10"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR3600",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C01"
                          },
                          {
                            "version_value": "V200R008C20"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AR510",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R006C12"
                          },
                          {
                            "version_value": "V200R006C13"
                          },
                          {
                            "version_value": "V200R006C15"
                          },
                          {
                            "version_value": "V200R006C16"
                          },
                          {
                            "version_value": "V200R006C17"
                          },
                          {
                            "version_value": "V200R007C00SPC180T"
                          },
                          {
                            "version_value": "V200R007C00SPC600"
                          },
                          {
                            "version_value": "V200R007C00SPC900"
                          },
                          {
                            "version_value": "V200R007C00SPCb00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "DP300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R002C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "IPS Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NGFW Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R002C00"
                          },
                          {
                            "version_value": "V500R002C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NIP6300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NIP6600",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NIP6800",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "NetEngine16EX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RSE6500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R002C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SMC2.0",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R003C00SPC200T"
                          },
                          {
                            "version_value": "V100R003C00SPC300T"
                          },
                          {
                            "version_value": "V100R003C00SPC301T"
                          },
                          {
                            "version_value": "V100R003C10"
                          },
                          {
                            "version_value": "V100R005C00SPC100"
                          },
                          {
                            "version_value": "V100R005C00SPC101B001T"
                          },
                          {
                            "version_value": "V100R005C00SPC102"
                          },
                          {
                            "version_value": "V100R005C00SPC103"
                          },
                          {
                            "version_value": "V100R005C00SPC200"
                          },
                          {
                            "version_value": "V100R005C00SPC201T"
                          },
                          {
                            "version_value": "V500R002C00"
                          },
                          {
                            "version_value": "V600R006C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SRG1300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SRG2300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R007C02"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SRG3300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R006C10"
                          },
                          {
                            "version_value": "V200R007C00"
                          },
                          {
                            "version_value": "V200R008C20"
                          },
                          {
                            "version_value": "V200R008C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SVN5600",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SVN5800",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SVN5800-C",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SeMG9811",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V300R001C01SPC500"
                          },
                          {
                            "version_value": "V300R001C01SPC500T"
                          },
                          {
                            "version_value": "V300R001C01SPC700"
                          },
                          {
                            "version_value": "V300R001C01SPCa00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Secospace USG6300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Secospace USG6500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Secospace USG6600",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C00"
                          },
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C20"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SoftCo",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R001C01SPC300"
                          },
                          {
                            "version_value": "V200R001C01SPC400"
                          },
                          {
                            "version_value": "V200R001C01SPC500"
                          },
                          {
                            "version_value": "V200R001C01SPC600"
                          },
                          {
                            "version_value": "V200R001C01SPH703"
                          },
                          {
                            "version_value": "V200R003C00SPC100"
                          },
                          {
                            "version_value": "V200R003C00SPC200"
                          },
                          {
                            "version_value": "V200R003C00SPC300"
                          },
                          {
                            "version_value": "V200R003C00SPC500"
                          },
                          {
                            "version_value": "V200R003C20"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TE30",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C02SPC100"
                          },
                          {
                            "version_value": "V100R001C02SPC200 V100R001C10"
                          },
                          {
                            "version_value": "V500R002C00SPC200"
                          },
                          {
                            "version_value": "V500R002C00SPC600"
                          },
                          {
                            "version_value": "V500R002C00SPC700"
                          },
                          {
                            "version_value": "V500R002C00SPC900"
                          },
                          {
                            "version_value": "V500R002C00SPCb00"
                          },
                          {
                            "version_value": "V600R006C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TE40",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R002C00SPC600"
                          },
                          {
                            "version_value": "V500R002C00SPC700"
                          },
                          {
                            "version_value": "V500R002C00SPC900"
                          },
                          {
                            "version_value": "V500R002C00SPCb00"
                          },
                          {
                            "version_value": "V600R006C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TE50",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R002C00SPC600"
                          },
                          {
                            "version_value": "V500R002C00SPCb00"
                          },
                          {
                            "version_value": "V600R006C00"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TE60",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C01SPC100"
                          },
                          {
                            "version_value": "V100R001C10"
                          },
                          {
                            "version_value": "V100R001C10SPC300"
                          },
                          {
                            "version_value": "V100R001C10SPC400"
                          },
                          {
                            "version_value": "V100R001C10SPC500"
                          },
                          {
                            "version_value": "V100R001C10SPC600"
                          },
                          {
                            "version_value": "V100R001C10SPC800"
                          },
                          {
                            "version_value": "V100R003C00"
                          },
                          {
                            "version_value": "V500R002C00"
                          },
                          {
                            "version_value": "V500R002C00SPC100"
                          },
                          {
                            "version_value": "V500R002C00SPC200"
                          },
                          {
                            "version_value": "V500R002C00SPC300"
                          },
                          {
                            "version_value": "V500R002C00SPC600"
                          },
                          {
                            "version_value": "V500R002C00SPC700"
                          },
                          {
                            "version_value": "V500R002C00SPC800"
                          },
                          {
                            "version_value": "V500R002C00SPC900"
                          },
                          {
                            "version_value": "V500R002C00SPCa00"
                          },
                          {
                            "version_value": "V500R002C00SPCb00"
                          },
                          {
                            "version_value": "V600R006C00"
                          },
                          {
                            "version_value": "V600R006C00SPC200"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TP3206",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R002C00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "USG9500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V300R001C01"
                          },
                          {
                            "version_value": "V300R001C20"
                          },
                          {
                            "version_value": "V500R001C00"
                          },
                          {
                            "version_value": "V500R001C20"
                          },
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C50"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "USG9520",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V300R001C01SPC800PWE"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "USG9560",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V300R001C20SPC300"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VP9660",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V200R001C02SPC100"
                          },
                          {
                            "version_value": "V200R001C02SPC200"
                          },
                          {
                            "version_value": "V200R001C02SPC300"
                          },
                          {
                            "version_value": "V200R001C02SPC300T"
                          },
                          {
                            "version_value": "V200R001C02SPC400"
                          },
                          {
                            "version_value": "V200R001C30SPC100"
                          },
                          {
                            "version_value": "V200R001C30SPC100B015T"
                          },
                          {
                            "version_value": "V200R001C30SPC101"
                          },
                          {
                            "version_value": "V200R001C30SPC101TB015"
                          },
                          {
                            "version_value": "V200R001C30SPC102T"
                          },
                          {
                            "version_value": "V200R001C30SPC103T"
                          },
                          {
                            "version_value": "V200R001C30SPC104T"
                          },
                          {
                            "version_value": "V200R001C30SPC200"
                          },
                          {
                            "version_value": "V200R001C30SPC200B022T"
                          },
                          {
                            "version_value": "V200R001C30SPC201B023T"
                          },
                          {
                            "version_value": "V200R001C30SPC202B025T"
                          },
                          {
                            "version_value": "V200R001C30SPC203T"
                          },
                          {
                            "version_value": "V200R001C30SPC206T"
                          },
                          {
                            "version_value": "V200R001C30SPC207T"
                          },
                          {
                            "version_value": "V200R001C30SPC208T"
                          },
                          {
                            "version_value": "V200R001C30SPC209T"
                          },
                          {
                            "version_value": "V200R001C30SPC300"
                          },
                          {
                            "version_value": "V200R001C30SPC400"
                          },
                          {
                            "version_value": "V200R001C30SPC400B001"
                          },
                          {
                            "version_value": "V200R001C30SPC400T"
                          },
                          {
                            "version_value": "V200R001C30SPC401T"
                          },
                          {
                            "version_value": "V200R001C30SPC402T"
                          },
                          {
                            "version_value": "V200R001C30SPC403T"
                          },
                          {
                            "version_value": "V200R001C30SPC404T"
                          },
                          {
                            "version_value": "V200R001C30SPC405T"
                          },
                          {
                            "version_value": "V200R001C30SPC600"
                          },
                          {
                            "version_value": "V200R001C30SPC700"
                          },
                          {
                            "version_value": "V200R001C30SPC700T"
                          },
                          {
                            "version_value": "V200R001C30SPC701T"
                          },
                          {
                            "version_value": "V200R001C30SPC702T"
                          },
                          {
                            "version_value": "V200R001C30SPC703T"
                          },
                          {
                            "version_value": "V200R001C30SPC800"
                          },
                          {
                            "version_value": "V200R001C30SPC800T"
                          },
                          {
                            "version_value": "V200R001C30SPC900"
                          },
                          {
                            "version_value": "V200R001C30SPCa00"
                          },
                          {
                            "version_value": "V200R001C30SPCa00T"
                          },
                          {
                            "version_value": "V200R001C30SPCa01"
                          },
                          {
                            "version_value": "V200R001C30SPCa01T"
                          },
                          {
                            "version_value": "V200R001C30SPCa02T"
                          },
                          {
                            "version_value": "V200R001C30SPCb00"
                          },
                          {
                            "version_value": "V200R001C30SPCc00"
                          },
                          {
                            "version_value": "V200R001C30SPCd00"
                          },
                          {
                            "version_value": "V200R001C30SPCd00T"
                          },
                          {
                            "version_value": "V200R001C30SPCd01T"
                          },
                          {
                            "version_value": "V200R001C30SPCd"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ViewPoint 8660",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R008C03B013SP02"
                          },
                          {
                            "version_value": "V100R008C03B013SP03"
                          },
                          {
                            "version_value": "V100R008C03B013SP04"
                          },
                          {
                            "version_value": "V100R008C03SPC100"
                          },
                          {
                            "version_value": "V100R008C03SPC200"
                          },
                          {
                            "version_value": "V100R008C03SPC300"
                          },
                          {
                            "version_value": "V100R008C03SPC400"
                          },
                          {
                            "version_value": "V100R008C03SPC500"
                          },
                          {
                            "version_value": "V100R008C03SPC600"
                          },
                          {
                            "version_value": "V100R008C03SPC700"
                          },
                          {
                            "version_value": "V100R008C03SPC800"
                          },
                          {
                            "version_value": "V100R008C03SPC900"
                          },
                          {
                            "version_value": "V100R008C03SPCa00"
                          },
                          {
                            "version_value": "V100R008C03SPCb00"
                          },
                          {
                            "version_value": "V100R008C03SPCc00"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ViewPoint 9030",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R011C02SPC100"
                          },
                          {
                            "version_value": "V100R011C03B012SP15"
                          },
                          {
                            "version_value": "V100R011C03B012SP16"
                          },
                          {
                            "version_value": "V100R011C03B015SP03"
                          },
                          {
                            "version_value": "V100R011C03LGWL01SPC100"
                          },
                          {
                            "version_value": "V100R011C03LGWL01SPC100B012"
                          },
                          {
                            "version_value": "V100R011C03SPC100"
                          },
                          {
                            "version_value": "V100R011C03SPC200"
                          },
                          {
                            "version_value": "V100R011C03SPC300"
                          },
                          {
                            "version_value": "V100R011C03SPC400"
                          },
                          {
                            "version_value": "V100R011C03SPC500"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1910",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1911",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPH309"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1930",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "eSpace U1960",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C01SPC500"
                          },
                          {
                            "version_value": "V100R001C20LCRW01T"
                          },
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPC600T"
                          },
                          {
                            "version_value": "V100R001C20SPH309"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1980",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C01SPC500T"
                          },
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500T"
                          },
                          {
                            "version_value": "V100R001C20SPC502"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPH309"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "eSpace U1981",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R001C20SPC300"
                          },
                          {
                            "version_value": "V100R001C20SPC400"
                          },
                          {
                            "version_value": "V100R001C20SPC500"
                          },
                          {
                            "version_value": "V100R001C20SPC600"
                          },
                          {
                            "version_value": "V100R001C20SPC700"
                          },
                          {
                            "version_value": "V100R001C20SPH702"
                          },
                          {
                            "version_value": "V100R001C20SPH703"
                          },
                          {
                            "version_value": "V100R001C30"
                          },
                          {
                            "version_value": "V200R003C00"
                          },
                          {
                            "version_value": "V200R003C20"
                          },
                          {
                            "version_value": "V200R003C30"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "DoS"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-19417",
    "datePublished": "2020-07-08T16:53:05",
    "dateReserved": "2019-11-29T00:00:00",
    "dateUpdated": "2024-08-05T02:16:47.230Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-8213
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-16 17:54
Severity ?
Summary
Huawei SMC2.0 with software of V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00, V600R006C00 has an input validation vulnerability when handle TLS and DTLS handshake with certificate. Due to the insufficient validation of received PKI certificates, remote attackers could exploit this vulnerability to crash the TLS module.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. SMC2.0 Version: V100R003C10,V100R005C00SPC100,V100R005C00SPC101B001T,V100R005C00SPC102,V100R005C00SPC103,V100R005C00SPC200,V100R005C00SPC201T,V500R002C00,V600R006C00,
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:27:23.238Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SMC2.0",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "V100R003C10,V100R005C00SPC100,V100R005C00SPC101B001T,V100R005C00SPC102,V100R005C00SPC103,V100R005C00SPC200,V100R005C00SPC201T,V500R002C00,V600R006C00,"
            }
          ]
        }
      ],
      "datePublic": "2017-11-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei SMC2.0 with software of V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00, V600R006C00 has an input validation vulnerability when handle TLS and DTLS handshake with certificate. Due to the insufficient validation of received PKI certificates, remote attackers could exploit this vulnerability to crash the TLS module."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "input validation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-27T16:57:01",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "DATE_PUBLIC": "2017-11-15T00:00:00",
          "ID": "CVE-2017-8213",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SMC2.0",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V100R003C10,V100R005C00SPC100,V100R005C00SPC101B001T,V100R005C00SPC102,V100R005C00SPC103,V100R005C00SPC200,V100R005C00SPC201T,V500R002C00,V600R006C00,"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei SMC2.0 with software of V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00, V600R006C00 has an input validation vulnerability when handle TLS and DTLS handshake with certificate. Due to the insufficient validation of received PKI certificates, remote attackers could exploit this vulnerability to crash the TLS module."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "input validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-8213",
    "datePublished": "2017-11-22T19:00:00Z",
    "dateReserved": "2017-04-25T00:00:00",
    "dateUpdated": "2024-09-16T17:54:04.082Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-8162
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-16 19:41
Severity ?
Summary
AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300 Version: AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:27:22.877Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10,  ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2017-11-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "DoS",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-22T18:57:01",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "DATE_PUBLIC": "2017-11-15T00:00:00",
          "ID": "CVE-2017-8162",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "DoS"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-8162",
    "datePublished": "2017-11-22T19:00:00Z",
    "dateReserved": "2017-04-25T00:00:00",
    "dateUpdated": "2024-09-16T19:41:24.286Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-2808
Vulnerability from cvelistv5
Published
2015-04-01 00:00
Modified
2024-08-06 05:24
Severity ?
Summary
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
References
http://marc.info/?l=bugtraq&m=143818140118771&w=2vendor-advisory
http://rhn.redhat.com/errata/RHSA-2015-1243.htmlvendor-advisory
http://rhn.redhat.com/errata/RHSA-2015-1007.htmlvendor-advisory
http://marc.info/?l=bugtraq&m=143817899717054&w=2vendor-advisory
http://marc.info/?l=bugtraq&m=144493176821532&w=2vendor-advisory
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://rhn.redhat.com/errata/RHSA-2015-1006.htmlvendor-advisory
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://kb.juniper.net/JSA10783
http://www.securitytracker.com/id/1033737vdb-entry
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.htmlvendor-advisory
http://marc.info/?l=bugtraq&m=144060576831314&w=2vendor-advisory
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securitytracker.com/id/1036222vdb-entry
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://marc.info/?l=bugtraq&m=143817899717054&w=2vendor-advisory
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
https://security.gentoo.org/glsa/201512-10vendor-advisory
http://rhn.redhat.com/errata/RHSA-2015-1229.htmlvendor-advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
http://www.securitytracker.com/id/1032600vdb-entry
http://www.securitytracker.com/id/1032910vdb-entry
http://www.ubuntu.com/usn/USN-2706-1vendor-advisory
http://rhn.redhat.com/errata/RHSA-2015-1526.htmlvendor-advisory
http://marc.info/?l=bugtraq&m=143817021313142&w=2vendor-advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.securitytracker.com/id/1032599vdb-entry
http://marc.info/?l=bugtraq&m=144104533800819&w=2vendor-advisory
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
http://marc.info/?l=bugtraq&m=144043644216842&w=2vendor-advisory
http://www.securitytracker.com/id/1032734vdb-entry
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892vendor-advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
http://www.securitytracker.com/id/1033769vdb-entry
http://www.securitytracker.com/id/1032707vdb-entry
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.htmlvendor-advisory
http://marc.info/?l=bugtraq&m=143817021313142&w=2vendor-advisory
http://rhn.redhat.com/errata/RHSA-2015-1091.htmlvendor-advisory
http://marc.info/?l=bugtraq&m=144069189622016&w=2vendor-advisory
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888vendor-advisory
http://rhn.redhat.com/errata/RHSA-2015-1228.htmlvendor-advisory
http://marc.info/?l=bugtraq&m=144060606031437&w=2vendor-advisory
http://www.securitytracker.com/id/1032708vdb-entry
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.debian.org/security/2015/dsa-3316vendor-advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.htmlvendor-advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securitytracker.com/id/1033415vdb-entry
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
http://marc.info/?l=bugtraq&m=143818140118771&w=2vendor-advisory
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
http://marc.info/?l=bugtraq&m=144104565600964&w=2vendor-advisory
http://marc.info/?l=bugtraq&m=144493176821532&w=2vendor-advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://marc.info/?l=bugtraq&m=144102017024820&w=2vendor-advisory
http://www.securitytracker.com/id/1033432vdb-entry
http://marc.info/?l=bugtraq&m=143629696317098&w=2vendor-advisory
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.htmlvendor-advisory
http://www.securitytracker.com/id/1032858vdb-entry
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922vendor-advisory
http://www.securitytracker.com/id/1032788vdb-entry
http://www.ubuntu.com/usn/USN-2696-1vendor-advisory
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
http://www.debian.org/security/2015/dsa-3339vendor-advisory
http://rhn.redhat.com/errata/RHSA-2015-1020.htmlvendor-advisory
http://rhn.redhat.com/errata/RHSA-2015-1242.htmlvendor-advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.htmlvendor-advisory
http://www.securitytracker.com/id/1033431vdb-entry
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
http://www.securitytracker.com/id/1032868vdb-entry
http://marc.info/?l=bugtraq&m=144059703728085&w=2vendor-advisory
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.securityfocus.com/bid/91787vdb-entry
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.htmlvendor-advisory
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.htmlvendor-advisory
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.htmlvendor-advisory
http://rhn.redhat.com/errata/RHSA-2015-1241.htmlvendor-advisory
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://rhn.redhat.com/errata/RHSA-2015-1230.htmlvendor-advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
http://marc.info/?l=bugtraq&m=143456209711959&w=2vendor-advisory
http://www.securitytracker.com/id/1033386vdb-entry
http://marc.info/?l=bugtraq&m=143741441012338&w=2vendor-advisory
http://www.securitytracker.com/id/1033072vdb-entry
http://marc.info/?l=bugtraq&m=143741441012338&w=2vendor-advisory
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.htmlvendor-advisory
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
http://rhn.redhat.com/errata/RHSA-2015-1021.htmlvendor-advisory
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.htmlvendor-advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.htmlvendor-advisory
http://marc.info/?l=bugtraq&m=144059660127919&w=2vendor-advisory
http://www.securityfocus.com/bid/73684vdb-entry
http://www.securitytracker.com/id/1032990vdb-entry
http://www.securitytracker.com/id/1033071vdb-entry
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.htmlvendor-advisory
https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:24:38.828Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SSRT102127",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2"
          },
          {
            "name": "RHSA-2015:1243",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1243.html"
          },
          {
            "name": "RHSA-2015:1007",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html"
          },
          {
            "name": "HPSBGN03367",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2"
          },
          {
            "name": "HPSBUX03512",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
          },
          {
            "name": "RHSA-2015:1006",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://kb.juniper.net/JSA10783"
          },
          {
            "name": "1033737",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1033737"
          },
          {
            "name": "SUSE-SU-2015:2192",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
          },
          {
            "name": "HPSBGN03399",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=144060576831314\u0026w=2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
          },
          {
            "name": "1036222",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1036222"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034"
          },
          {
            "name": "SSRT102129",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769"
          },
          {
            "name": "GLSA-201512-10",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201512-10"
          },
          {
            "name": "RHSA-2015:1229",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1229.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650"
          },
          {
            "name": "1032600",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032600"
          },
          {
            "name": "1032910",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032910"
          },
          {
            "name": "USN-2706-1",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2706-1"
          },
          {
            "name": "RHSA-2015:1526",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1526.html"
          },
          {
            "name": "SSRT102133",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
          },
          {
            "name": "1032599",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032599"
          },
          {
            "name": "HPSBMU03401",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=144104533800819\u0026w=2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163"
          },
          {
            "name": "HPSBMU03345",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=144043644216842\u0026w=2"
          },
          {
            "name": "1032734",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032734"
          },
          {
            "name": "IV71892",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347"
          },
          {
            "name": "1033769",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1033769"
          },
          {
            "name": "1032707",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032707"
          },
          {
            "name": "openSUSE-SU-2015:1289",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"
          },
          {
            "name": "HPSBGN03372",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2"
          },
          {
            "name": "RHSA-2015:1091",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html"
          },
          {
            "name": "HPSBGN03402",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=144069189622016\u0026w=2"
          },
          {
            "name": "IV71888",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888"
          },
          {
            "name": "RHSA-2015:1228",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1228.html"
          },
          {
            "name": "HPSBGN03405",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=144060606031437\u0026w=2"
          },
          {
            "name": "1032708",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032708"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/hw-454055"
          },
          {
            "name": "DSA-3316",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2015/dsa-3316"
          },
          {
            "name": "SUSE-SU-2015:2166",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
          },
          {
            "name": "1033415",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1033415"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246"
          },
          {
            "name": "HPSBGN03366",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709"
          },
          {
            "name": "HPSBGN03403",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=144104565600964\u0026w=2"
          },
          {
            "name": "SSRT102254",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640"
          },
          {
            "name": "HPSBGN03407",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=144102017024820\u0026w=2"
          },
          {
            "name": "1033432",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1033432"
          },
          {
            "name": "HPSBGN03354",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=143629696317098\u0026w=2"
          },
          {
            "name": "SUSE-SU-2015:1138",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html"
          },
          {
            "name": "1032858",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032858"
          },
          {
            "name": "SSRT102073",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922"
          },
          {
            "name": "1032788",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032788"
          },
          {
            "name": "USN-2696-1",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2696-1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf"
          },
          {
            "name": "DSA-3339",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2015/dsa-3339"
          },
          {
            "name": "RHSA-2015:1020",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html"
          },
          {
            "name": "RHSA-2015:1242",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10727"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241"
          },
          {
            "name": "SUSE-SU-2015:1086",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html"
          },
          {
            "name": "1033431",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1033431"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988"
          },
          {
            "name": "1032868",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032868"
          },
          {
            "name": "HPSBGN03415",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=144059703728085\u0026w=2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
          },
          {
            "name": "91787",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/91787"
          },
          {
            "name": "SUSE-SU-2015:1319",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html"
          },
          {
            "name": "SUSE-SU-2015:1320",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html"
          },
          {
            "name": "openSUSE-SU-2015:1288",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"
          },
          {
            "name": "RHSA-2015:1241",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
          },
          {
            "name": "RHSA-2015:1230",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1230.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888"
          },
          {
            "name": "HPSBGN03338",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=143456209711959\u0026w=2"
          },
          {
            "name": "1033386",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1033386"
          },
          {
            "name": "HPSBMU03377",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2"
          },
          {
            "name": "1033072",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1033072"
          },
          {
            "name": "SSRT102150",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789"
          },
          {
            "name": "SUSE-SU-2015:1085",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119"
          },
          {
            "name": "RHSA-2015:1021",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960015"
          },
          {
            "name": "SUSE-SU-2015:1073",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935"
          },
          {
            "name": "SUSE-SU-2015:1161",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html"
          },
          {
            "name": "HPSBGN03414",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=144059660127919\u0026w=2"
          },
          {
            "name": "73684",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/73684"
          },
          {
            "name": "1032990",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032990"
          },
          {
            "name": "1033071",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1033071"
          },
          {
            "name": "SUSE-SU-2016:0113",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-03-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the \"Bar Mitzvah\" issue."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-07T16:46:59.848306",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SSRT102127",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2"
        },
        {
          "name": "RHSA-2015:1243",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1243.html"
        },
        {
          "name": "RHSA-2015:1007",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html"
        },
        {
          "name": "HPSBGN03367",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2"
        },
        {
          "name": "HPSBUX03512",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2"
        },
        {
          "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
        },
        {
          "name": "RHSA-2015:1006",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html"
        },
        {
          "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256"
        },
        {
          "url": "https://kb.juniper.net/JSA10783"
        },
        {
          "name": "1033737",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1033737"
        },
        {
          "name": "SUSE-SU-2015:2192",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
        },
        {
          "name": "HPSBGN03399",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=144060576831314\u0026w=2"
        },
        {
          "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
        },
        {
          "name": "1036222",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1036222"
        },
        {
          "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034"
        },
        {
          "name": "SSRT102129",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2"
        },
        {
          "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769"
        },
        {
          "name": "GLSA-201512-10",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/201512-10"
        },
        {
          "name": "RHSA-2015:1229",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1229.html"
        },
        {
          "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650"
        },
        {
          "name": "1032600",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1032600"
        },
        {
          "name": "1032910",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1032910"
        },
        {
          "name": "USN-2706-1",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2706-1"
        },
        {
          "name": "RHSA-2015:1526",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1526.html"
        },
        {
          "name": "SSRT102133",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2"
        },
        {
          "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
        },
        {
          "name": "1032599",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1032599"
        },
        {
          "name": "HPSBMU03401",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=144104533800819\u0026w=2"
        },
        {
          "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565"
        },
        {
          "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190"
        },
        {
          "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380"
        },
        {
          "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163"
        },
        {
          "name": "HPSBMU03345",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=144043644216842\u0026w=2"
        },
        {
          "name": "1032734",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1032734"
        },
        {
          "name": "IV71892",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347"
        },
        {
          "name": "1033769",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1033769"
        },
        {
          "name": "1032707",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1032707"
        },
        {
          "name": "openSUSE-SU-2015:1289",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"
        },
        {
          "name": "HPSBGN03372",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2"
        },
        {
          "name": "RHSA-2015:1091",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html"
        },
        {
          "name": "HPSBGN03402",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=144069189622016\u0026w=2"
        },
        {
          "name": "IV71888",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888"
        },
        {
          "name": "RHSA-2015:1228",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1228.html"
        },
        {
          "name": "HPSBGN03405",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=144060606031437\u0026w=2"
        },
        {
          "name": "1032708",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1032708"
        },
        {
          "url": "http://www.huawei.com/en/psirt/security-advisories/hw-454055"
        },
        {
          "name": "DSA-3316",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://www.debian.org/security/2015/dsa-3316"
        },
        {
          "name": "SUSE-SU-2015:2166",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
        },
        {
          "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
        },
        {
          "name": "1033415",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1033415"
        },
        {
          "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246"
        },
        {
          "name": "HPSBGN03366",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2"
        },
        {
          "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709"
        },
        {
          "name": "HPSBGN03403",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=144104565600964\u0026w=2"
        },
        {
          "name": "SSRT102254",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2"
        },
        {
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640"
        },
        {
          "name": "HPSBGN03407",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=144102017024820\u0026w=2"
        },
        {
          "name": "1033432",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1033432"
        },
        {
          "name": "HPSBGN03354",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=143629696317098\u0026w=2"
        },
        {
          "name": "SUSE-SU-2015:1138",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html"
        },
        {
          "name": "1032858",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1032858"
        },
        {
          "name": "SSRT102073",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922"
        },
        {
          "name": "1032788",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1032788"
        },
        {
          "name": "USN-2696-1",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2696-1"
        },
        {
          "url": "https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf"
        },
        {
          "name": "DSA-3339",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://www.debian.org/security/2015/dsa-3339"
        },
        {
          "name": "RHSA-2015:1020",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html"
        },
        {
          "name": "RHSA-2015:1242",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html"
        },
        {
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10727"
        },
        {
          "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241"
        },
        {
          "name": "SUSE-SU-2015:1086",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html"
        },
        {
          "name": "1033431",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1033431"
        },
        {
          "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988"
        },
        {
          "name": "1032868",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1032868"
        },
        {
          "name": "HPSBGN03415",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=144059703728085\u0026w=2"
        },
        {
          "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
        },
        {
          "name": "91787",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securityfocus.com/bid/91787"
        },
        {
          "name": "SUSE-SU-2015:1319",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html"
        },
        {
          "name": "SUSE-SU-2015:1320",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html"
        },
        {
          "name": "openSUSE-SU-2015:1288",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"
        },
        {
          "name": "RHSA-2015:1241",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html"
        },
        {
          "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140"
        },
        {
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
        },
        {
          "name": "RHSA-2015:1230",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1230.html"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888"
        },
        {
          "name": "HPSBGN03338",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=143456209711959\u0026w=2"
        },
        {
          "name": "1033386",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1033386"
        },
        {
          "name": "HPSBMU03377",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2"
        },
        {
          "name": "1033072",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1033072"
        },
        {
          "name": "SSRT102150",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2"
        },
        {
          "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789"
        },
        {
          "name": "SUSE-SU-2015:1085",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html"
        },
        {
          "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119"
        },
        {
          "name": "RHSA-2015:1021",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html"
        },
        {
          "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960015"
        },
        {
          "name": "SUSE-SU-2015:1073",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html"
        },
        {
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935"
        },
        {
          "name": "SUSE-SU-2015:1161",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html"
        },
        {
          "name": "HPSBGN03414",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=144059660127919\u0026w=2"
        },
        {
          "name": "73684",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securityfocus.com/bid/73684"
        },
        {
          "name": "1032990",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1032990"
        },
        {
          "name": "1033071",
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securitytracker.com/id/1033071"
        },
        {
          "name": "SUSE-SU-2016:0113",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
        },
        {
          "url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-2808",
    "datePublished": "2015-04-01T00:00:00",
    "dateReserved": "2015-03-31T00:00:00",
    "dateUpdated": "2024-08-06T05:24:38.828Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-8163
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-16 18:09
Severity ?
Summary
AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300 Version: AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:27:22.805Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10,  ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2017-11-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "out-of-bounds read",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-22T18:57:01",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "DATE_PUBLIC": "2017-11-15T00:00:00",
          "ID": "CVE-2017-8163",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "out-of-bounds read"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-8163",
    "datePublished": "2017-11-22T19:00:00Z",
    "dateReserved": "2017-04-25T00:00:00",
    "dateUpdated": "2024-09-16T18:09:25.595Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-22340
Vulnerability from cvelistv5
Published
2021-06-29 18:45
Modified
2024-08-03 18:37
Severity ?
Summary
There is a multiple threads race condition vulnerability in Huawei product. A race condition exists for concurrent I/O read by multiple threads. An attacker with the root permission can exploit this vulnerability by performing some operations. Successful exploitation of this vulnerability may cause the system to crash. Affected product versions include: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2.0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931
Impacted products
Vendor Product Version
n/a ManageOne;SMC2.0 Version: 6.5.1.SPC200,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.SPC100
Version: V600R019C10SPC700,V600R019C10SPC702,V600R019C10SPC703,V600R019C10SPC800,V600R019C10SPC900,V600R019C10SPC910,V600R019C10SPC920,V600R019C10SPC921,V600R019C10SPC922,V600R019C10SPC930,V600R019C10SPC931
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T18:37:18.593Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ManageOne;SMC2.0",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "6.5.1.SPC200,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.SPC100"
            },
            {
              "status": "affected",
              "version": "V600R019C10SPC700,V600R019C10SPC702,V600R019C10SPC703,V600R019C10SPC800,V600R019C10SPC900,V600R019C10SPC910,V600R019C10SPC920,V600R019C10SPC921,V600R019C10SPC922,V600R019C10SPC930,V600R019C10SPC931"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There is a multiple threads race condition vulnerability in Huawei product. A race condition exists for concurrent I/O read by multiple threads. An attacker with the root permission can exploit this vulnerability by performing some operations. Successful exploitation of this vulnerability may cause the system to crash. Affected product versions include: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2.0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Multiple Threads Race Condition",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-29T18:45:03",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2021-22340",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ManageOne;SMC2.0",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "6.5.1.SPC200,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.SPC100"
                          },
                          {
                            "version_value": "V600R019C10SPC700,V600R019C10SPC702,V600R019C10SPC703,V600R019C10SPC800,V600R019C10SPC900,V600R019C10SPC910,V600R019C10SPC920,V600R019C10SPC921,V600R019C10SPC922,V600R019C10SPC930,V600R019C10SPC931"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is a multiple threads race condition vulnerability in Huawei product. A race condition exists for concurrent I/O read by multiple threads. An attacker with the root permission can exploit this vulnerability by performing some operations. Successful exploitation of this vulnerability may cause the system to crash. Affected product versions include: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2.0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Multiple Threads Race Condition"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en",
              "refsource": "MISC",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2021-22340",
    "datePublished": "2021-06-29T18:45:03",
    "dateReserved": "2021-01-05T00:00:00",
    "dateUpdated": "2024-08-03T18:37:18.593Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-15331
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:50:16.586Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2017-11-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "out-of-bounds read",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-15T15:57:02",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2017-15331",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03,"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "out-of-bounds read"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-15331",
    "datePublished": "2018-02-15T16:00:00",
    "dateReserved": "2017-10-14T00:00:00",
    "dateUpdated": "2024-08-05T19:50:16.586Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-15332
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:50:16.527Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2017-11-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "memory leak",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-15T15:57:02",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2017-15332",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03,"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "memory leak"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-15332",
    "datePublished": "2018-02-15T16:00:00",
    "dateReserved": "2017-10-14T00:00:00",
    "dateUpdated": "2024-08-05T19:50:16.527Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2020-07-08 17:15
Modified
2024-11-21 04:34
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r007c00spc600
huawei ar510_firmware v200r007c00spc900
huawei ar510_firmware v200r007c00spcb00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei smc2.0_firmware v100r003c00spc200t
huawei smc2.0_firmware v100r003c00spc300t
huawei smc2.0_firmware v100r003c00spc301t
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00spc100
huawei smc2.0_firmware v100r005c00spc101b001t
huawei smc2.0_firmware v100r005c00spc102
huawei smc2.0_firmware v100r005c00spc103
huawei smc2.0_firmware v100r005c00spc200
huawei smc2.0_firmware v100r005c00spc201t
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v600r006c00
huawei smc2.0 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01spc500
huawei semg9811_firmware v300r001c01spc500t
huawei semg9811_firmware v300r001c01spc700
huawei semg9811_firmware v300r001c01spca00
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei softco_firmware v200r001c01spc300
huawei softco_firmware v200r001c01spc400
huawei softco_firmware v200r001c01spc500
huawei softco_firmware v200r001c01spc600
huawei softco_firmware v200r001c01sph703
huawei softco_firmware v200r003c00spc100
huawei softco_firmware v200r003c00spc200
huawei softco_firmware v200r003c00spc500
huawei softco_firmware v200r003c20
huawei softco -
huawei te30_firmware v100r001c02spc100
huawei te30_firmware v100r001c02spc200
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00spc200
huawei te30_firmware v500r002c00spc600
huawei te30_firmware v500r002c00spc700
huawei te30_firmware v500r002c00spc900
huawei te30_firmware v500r002c00spcb00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00spc600
huawei te40_firmware v500r002c00spc700
huawei te40_firmware v500r002c00spc900
huawei te40_firmware v500r002c00spcb00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00spc600
huawei te50_firmware v500r002c00spcb00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01spc100
huawei te60_firmware v100r001c10
huawei te60_firmware v100r001c10spc300
huawei te60_firmware v100r001c10spc400
huawei te60_firmware v100r001c10spc500
huawei te60_firmware v100r001c10spc600
huawei te60_firmware v100r001c10spc800
huawei te60_firmware v100r003c00
huawei te60_firmware v500r002c00
huawei te60_firmware v500r002c00spc100
huawei te60_firmware v500r002c00spc200
huawei te60_firmware v500r002c00spc300
huawei te60_firmware v500r002c00spc600
huawei te60_firmware v500r002c00spc700
huawei te60_firmware v500r002c00spc800
huawei te60_firmware v500r002c00spc900
huawei te60_firmware v500r002c00spca00
huawei te60_firmware v500r002c00spcb00
huawei te60_firmware v600r006c00
huawei te60_firmware v600r006c00spc200
huawei te60 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -
huawei usg9500_firmware v300r001c01
huawei usg9500_firmware v300r001c20
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01spc800pwe
huawei usg9520 -
huawei usg9560_firmware v300r001c20spc300
huawei usg9560 -
huawei vp9660_firmware v200r001c02spc100
huawei vp9660_firmware v200r001c02spc200
huawei vp9660_firmware v200r001c02spc300
huawei vp9660_firmware v200r001c02spc300t
huawei vp9660_firmware v200r001c02spc400
huawei vp9660_firmware v200r001c30spc100
huawei vp9660_firmware v200r001c30spc100b015t
huawei vp9660_firmware v200r001c30spc101
huawei vp9660_firmware v200r001c30spc101tb015
huawei vp9660_firmware v200r001c30spc102t
huawei vp9660_firmware v200r001c30spc103t
huawei vp9660_firmware v200r001c30spc104t
huawei vp9660_firmware v200r001c30spc200
huawei vp9660_firmware v200r001c30spc200b022t
huawei vp9660_firmware v200r001c30spc201b023t
huawei vp9660_firmware v200r001c30spc202b025t
huawei vp9660_firmware v200r001c30spc203t
huawei vp9660_firmware v200r001c30spc206t
huawei vp9660_firmware v200r001c30spc207t
huawei vp9660_firmware v200r001c30spc208t
huawei vp9660_firmware v200r001c30spc209t
huawei vp9660_firmware v200r001c30spc300
huawei vp9660_firmware v200r001c30spc400
huawei vp9660_firmware v200r001c30spc400b001
huawei vp9660_firmware v200r001c30spc400t
huawei vp9660_firmware v200r001c30spc401t
huawei vp9660_firmware v200r001c30spc402t
huawei vp9660_firmware v200r001c30spc403t
huawei vp9660_firmware v200r001c30spc404t
huawei vp9660_firmware v200r001c30spc405t
huawei vp9660_firmware v200r001c30spc600
huawei vp9660_firmware v200r001c30spc700
huawei vp9660_firmware v200r001c30spc700t
huawei vp9660_firmware v200r001c30spc701t
huawei vp9660_firmware v200r001c30spc702t
huawei vp9660_firmware v200r001c30spc703t
huawei vp9660_firmware v200r001c30spc800
huawei vp9660_firmware v200r001c30spc800t
huawei vp9660_firmware v200r001c30spc900
huawei vp9660_firmware v200r001c30spca00
huawei vp9660_firmware v200r001c30spca00t
huawei vp9660_firmware v200r001c30spca01
huawei vp9660_firmware v200r001c30spca01t
huawei vp9660_firmware v200r001c30spca02t
huawei vp9660_firmware v200r001c30spcb00
huawei vp9660_firmware v200r001c30spcc00
huawei vp9660_firmware v200r001c30spcd00
huawei vp9660_firmware v200r001c30spcd00t
huawei vp9660_firmware v200r001c30spcd01t
huawei vp9660_firmware v200r001c30spcd02t
huawei vp9660_firmware v200r001c30spcd03t
huawei vp9660_firmware v200r001c30spcd04t
huawei vp9660_firmware v200r001c30spcd05t
huawei vp9660_firmware v200r001c30spce00
huawei vp9660_firmware v200r001c30spce01t
huawei vp9660_firmware v200r001c30spcf00
huawei vp9660_firmware v200r001c30spcg00
huawei vp9660_firmware v200r001c30spch00
huawei vp9660_firmware v200r001c30spci00
huawei vp9660_firmware v200r001c30spcj00
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c00spc001t
huawei vp9660_firmware v500r002c00spc200
huawei vp9660_firmware v500r002c00spc200t
huawei vp9660_firmware v500r002c00spc201t
huawei vp9660_firmware v500r002c00spc203t
huawei vp9660_firmware v500r002c00spc204t
huawei vp9660_firmware v500r002c00spc205t
huawei vp9660_firmware v500r002c00spc206t
huawei vp9660_firmware v500r002c00spc300
huawei vp9660_firmware v500r002c00spc400
huawei vp9660_firmware v500r002c00spc500
huawei vp9660_firmware v500r002c00spc600
huawei vp9660_firmware v500r002c00spc700
huawei vp9660_firmware v500r002c00spc800
huawei vp9660_firmware v500r002c00spc900
huawei vp9660_firmware v500r002c00spc900t
huawei vp9660_firmware v500r002c00spc901t
huawei vp9660_firmware v500r002c00spca00
huawei vp9660_firmware v500r002c00spcb00
huawei vp9660_firmware v500r002c00spcb01t
huawei vp9660_firmware v500r002c00spcc00
huawei vp9660_firmware v500r002c00spcd00
huawei vp9660_firmware v500r002c00t
huawei vp9660_firmware v500r002c10
huawei vp9660_firmware v500r002c10spc100
huawei vp9660_firmware v500r002c10spc100t
huawei vp9660_firmware v500r002c10t
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03b013sp02
huawei viewpoint_8660_firmware v100r008c03b013sp03
huawei viewpoint_8660_firmware v100r008c03b013sp04
huawei viewpoint_8660_firmware v100r008c03spc100
huawei viewpoint_8660_firmware v100r008c03spc200
huawei viewpoint_8660_firmware v100r008c03spc300
huawei viewpoint_8660_firmware v100r008c03spc400
huawei viewpoint_8660_firmware v100r008c03spc500
huawei viewpoint_8660_firmware v100r008c03spc600
huawei viewpoint_8660_firmware v100r008c03spc700
huawei viewpoint_8660_firmware v100r008c03spc800
huawei viewpoint_8660_firmware v100r008c03spc900
huawei viewpoint_8660_firmware v100r008c03spca00
huawei viewpoint_8660_firmware v100r008c03spcb00
huawei viewpoint_8660_firmware v100r008c03spcc00
huawei viewpoint_8660 -
huawei viewpoint_9030_firmware v100r011c02spc100
huawei viewpoint_9030_firmware v100r011c03b012sp15
huawei viewpoint_9030_firmware v100r011c03b012sp16
huawei viewpoint_9030_firmware v100r011c03b015sp03
huawei viewpoint_9030_firmware v100r011c03lgwl01spc100
huawei viewpoint_9030_firmware v100r011c03lgwl01spc100b012
huawei viewpoint_9030_firmware v100r011c03spc100
huawei viewpoint_9030_firmware v100r011c03spc200
huawei viewpoint_9030_firmware v100r011c03spc300
huawei viewpoint_9030_firmware v100r011c03spc400
huawei viewpoint_9030_firmware v100r011c03spc500
huawei viewpoint_9030 -
huawei espace_u1910_firmware v100r001c20spc300
huawei espace_u1910_firmware v100r001c20spc400
huawei espace_u1910_firmware v100r001c20spc500
huawei espace_u1910_firmware v100r001c20spc600
huawei espace_u1910_firmware v100r001c20sph703
huawei espace_u1910_firmware v200r003c00
huawei espace_u1910_firmware v200r003c20
huawei espace_u1910_firmware v200r003c30
huawei espace_u1910 -
huawei espace_u1911_firmware v100r001c20spc300
huawei espace_u1911_firmware v100r001c20spc400
huawei espace_u1911_firmware v100r001c20spc500
huawei espace_u1911_firmware v100r001c20spc600
huawei espace_u1911_firmware v100r001c20sph309
huawei espace_u1911_firmware v100r001c20sph703
huawei espace_u1911_firmware v200r003c00
huawei espace_u1911_firmware v200r003c20
huawei espace_u1911_firmware v200r003c30
huawei espace_u1911 -
huawei espace_u1930_firmware v100r001c20spc300
huawei espace_u1930_firmware v100r001c20spc400
huawei espace_u1930_firmware v100r001c20spc500
huawei espace_u1930_firmware v100r001c20spc600
huawei espace_u1930_firmware v100r001c20sph703
huawei espace_u1930_firmware v200r003c00
huawei espace_u1930_firmware v200r003c20
huawei espace_u1930_firmware v200r003c30
huawei espace_u1930 -
huawei espace_u1960_firmware v100r001c01spc500
huawei espace_u1960_firmware v100r001c20lcrw01t
huawei espace_u1960_firmware v100r001c20spc300
huawei espace_u1960_firmware v100r001c20spc400
huawei espace_u1960_firmware v100r001c20spc600
huawei espace_u1960_firmware v100r001c20spc600t
huawei espace_u1960_firmware v100r001c20sph309
huawei espace_u1960_firmware v100r001c20sph703
huawei espace_u1960_firmware v200r003c00
huawei espace_u1960_firmware v200r003c20
huawei espace_u1960_firmware v200r003c30
huawei espace_u1960 -
huawei espace_u1980_firmware v100r001c01spc500t
huawei espace_u1980_firmware v100r001c20spc300
huawei espace_u1980_firmware v100r001c20spc400
huawei espace_u1980_firmware v100r001c20spc500t
huawei espace_u1980_firmware v100r001c20spc502
huawei espace_u1980_firmware v100r001c20spc600
huawei espace_u1980_firmware v100r001c20sph309
huawei espace_u1980_firmware v100r001c20sph703
huawei espace_u1980_firmware v200r003c00
huawei espace_u1980_firmware v200r003c20
huawei espace_u1980_firmware v200r003c30
huawei espace_u1980 -
huawei espace_u1981_firmware v100r001c20spc300
huawei espace_u1981_firmware v100r001c20spc400
huawei espace_u1981_firmware v100r001c20spc500
huawei espace_u1981_firmware v100r001c20spc600
huawei espace_u1981_firmware v100r001c20spc700
huawei espace_u1981_firmware v100r001c20sph702
huawei espace_u1981_firmware v100r001c20sph703
huawei espace_u1981_firmware v100r001c30
huawei espace_u1981_firmware v200r003c00
huawei espace_u1981_firmware v200r003c20
huawei espace_u1981_firmware v200r003c30
huawei espace_u1981 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42376C56-573F-4A88-B18E-43F636B17B41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D6C34F-ED85-461D-89AF-3B8C439867FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "D86EA007-4A57-44D9-8867-C1587E785805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A35FE7-D526-455A-934B-08D54A0302A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DBC628-F348-4204-B212-11E8E6A0AC8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B487D436-B96E-4781-AFFD-2136154F9166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CFB676-658E-4DEF-8C29-13CA633D7270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B650408-1E40-49DF-9271-6248CC1DCC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4072905-CA96-44F9-8868-BB20BDC56EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE13681-CF1A-4765-B35A-E6E674C334B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
              "matchCriteriaId": "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C526D0-9638-4BF3-823E-48F758FD3B9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD9129C5-08E9-4689-8D19-478083484A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EDCE428-7453-4259-AAD9-091F0CF1413E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871106B-D3AF-4CFB-A544-1FA411642428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F3483B2-9EB6-4E34-900A-945C04A3160D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "94682861-8E53-408E-97F2-06A22DAC5466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A51677-9D99-491C-B524-C5ED5774AC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B55442-9A8C-4291-9086-17516814DFD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "84477B1C-413A-4F74-86DC-55E58AD07AB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "80411236-6B22-4937-87F3-E06C991B14D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A8E1096-F070-4CE9-B2B4-6368890706A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B469A91-4CD0-44D2-A982-3E612B855E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1856722C-597D-495D-AFCC-21E5FF6F2359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "728A7B78-6E19-4656-848F-269DB955070C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "946F5FF7-412F-40F9-A492-DE8E11E7B919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3D681F-E141-4BB1-9437-8BFE286CB164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D5066C9-7581-4284-AF23-0782870B2F03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "875441DD-575F-4F4D-A6BD-23C38641D330",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "51387999-E9D0-497F-A309-CA5E3126EB00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "649BB696-BDBE-46FC-A23D-287DE306D8BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD9417D-0515-4B21-AD32-E6B137575D01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC5100FF-B87F-4D3B-8B01-B9038028E436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B61BA3-EDFB-45C3-84C5-1581F6CEFF5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4145695-7ED4-4B0D-A30C-10A8183F323B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "2075745B-5A7D-47AC-8E3B-98F2AF49381B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9F838DA-3682-47DC-9058-ABAA6327885F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A94E752-CF8C-40EF-9499-309616765C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C4F484-8300-4793-AE06-EC8D8730B93C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5F6D278-95B6-4451-A252-AD870F61026C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF2AFB6B-038E-4F72-9875-7AC320ECB68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0AF0C0-46BF-4984-8378-954DF82EE227",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E57098-7E8D-4956-82E6-1474A50569C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C216CE3-3481-4F96-9D10-15B627929046",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46EE0FA6-7E53-488F-81A7-B2C906D65552",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C80D3BB-868B-461C-B97A-9C94C9F80858",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "019D2365-8BD9-4243-97CC-22264F30A24E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD8D36D-A4F2-4423-B57E-E9933710201E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB996A1-FFCC-478B-B2EA-5BF39B5217CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC8EF14-E249-49A4-8DD5-491EB1545040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "D81D19B4-82E0-48C4-A676-9D270B529F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98F49A2-2B7C-406E-BB2F-C5431427BA33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "219AF4A5-4134-4265-BF69-C340665714F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "353AFD36-2046-4E75-96FB-CBA7071C3257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC78B8F-B4BC-429D-9685-C30B47810B32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D137236-B70C-4AC9-A041-5857FE01F293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E335D2-FE4B-4316-8827-4741EC9AA674",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F5005B-13E9-49EB-82A1-9A03F3583037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D588964F-A5F2-4D5C-AE5D-17962E599370",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3189382E-6846-4713-A92F-ABD03683F4A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3983A57-2F07-4D21-9093-1DFEAB310E26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAED7AC3-F922-44FE-B29C-ED7383FC30E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB8B3C52-C668-43D7-875D-55047B26B4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3142B435-CE92-4D8A-B34B-E81B672359DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E990766D-FBD4-404E-A783-3D2D0BC210F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE469876-F873-4705-9760-097AE840A818",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ADD081E-6FDD-49A8-84B7-B90BE9FA3B19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA573F8-92CF-463C-B445-9C8B82069C89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EA327A0-4C37-4730-A8B4-E59DB15EFF1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED834B0-65AD-4905-A9EF-06DF505BC0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F233150-6AB0-4672-B20D-9B9DD7D5158F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5E62A6-34B0-4424-B4F7-0BB55890FB5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C57141-5167-4A45-B54B-E1724F414AAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "19732856-0E1C-4A37-83C2-4FE9E0DE260A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF191AC7-EB37-46BE-85EF-642D675BFC36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB0BB461-988A-4E55-BEFC-C5BB8245E751",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA493790-6452-4EBD-ABA4-8CC2AE4523C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E71665B-85F4-4914-812E-8E763FD5E9C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EEB3DB2-810A-4FB2-BE52-9694824F90F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "509AFB31-BF50-4AAA-AD42-309C86C0A9D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E11E0F5-C34B-4745-B6F0-8DF3522FA15B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "999D02AA-1B42-4B4E-BB7B-0B063DE5F2B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E5A0D4-E459-4230-94DB-E94946425071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "018039EB-7265-4B71-B462-4734FD1D0503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3C8433-FEA5-4784-8C0A-174C677AD50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "00F48D7B-BAAB-46F8-A428-5EC68EC34EA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6D177F9-8A65-4E1F-9576-D03171336510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "38671934-B566-4A73-9C97-C0236D4EEAFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "931FD3B3-A333-4277-AE55-494F5DB9F09F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "382868EB-07B6-448B-AF15-8C66046C9422",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71366A4-11F7-42F6-A1C7-A3D3E38E0ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "5547844C-BEDD-4819-8080-832AF545E80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "826F23F7-CD43-4C33-B08A-72D34DF152BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "2630F664-C5D1-4E38-9ABC-C5EEC0E61B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7B30D7-FD50-495D-B56D-BE29C6D42831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AF9B11-C3EE-482C-AD20-7482C87EDEF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC82CFB2-6CBD-47FE-9A9F-66B3FF36EFFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13F79BF-2919-45A3-9AB0-9D501DDA94B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC9042-0485-437F-811F-F8898B3B7EA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BD64645-CD8A-4FE3-9C28-E6001F210F3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "06047C06-B5D8-4495-A5E8-03FBC65AE2FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "D38CC7A1-D039-41BB-A795-95F5B877B9F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "18152B19-FD04-4983-B18A-0E362E8158F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "592AC67D-2210-46A4-9BB2-DA04C67E171B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FFE6C6E-BDF3-4841-9836-4C81A41F2129",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F0893C-8D47-43D7-A69B-E16F77E0F330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAA427C8-B75F-4C98-BCBF-5588409CDD18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "305174D3-15DE-4BAC-8AA6-699E487DDA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A29049D-F472-4772-8750-20730DA624E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "040454F6-FCDB-4320-8933-8F7DBB9956ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD78C2D6-13FA-4170-898D-D836C9DAE757",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "068AC8E5-1A15-4DF3-B021-557FA491AE38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "22007E6A-68FC-4AF4-A570-95873AFBF882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D1A4CC-2F7E-40AF-8874-EE3986176623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*",
              "matchCriteriaId": "A75EB727-3F43-4C93-BB8C-A115427A10F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60030EDB-682F-4107-80FC-5F03CE75131D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F14C758-4E82-41FF-9A75-EEBD18BE8882",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C0CBDFF-95C8-4558-8B3E-FF05AF23349C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BC5336A-313C-4FBE-B849-90FB0CD5BBBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "11F2C8F2-B1E0-4916-9D0A-DAAD8F7764E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFBFBF45-CC70-4C81-81FD-944F1534FE4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B92C07-6378-4B64-B69A-8690832C1EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "803E2C56-941D-4DF0-8758-0F82D7A61689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*",
              "matchCriteriaId": "D745C321-86C5-4CB0-93E1-6368CDB76F86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*",
              "matchCriteriaId": "67AFAEF7-C9B7-46B3-B862-AD038915AEA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF11CB1A-17B3-4A74-8B36-AF3A5D4DC70B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDD1DAC8-19FE-425D-BAA6-5B391B5D6319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A014E8-0166-4005-B753-3EA5661AFFA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*",
              "matchCriteriaId": "090529B7-53B6-4385-B766-B2D338E5D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "629ACAC7-E17A-488A-9E16-AD7CEB0EB5D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C48C037-451F-4BDA-BFEA-5A35E55BB7C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DF54BC9-26E9-450A-B96F-DD016DDDE39F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBF3A771-4F45-4240-A48D-4F66776D36D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*",
              "matchCriteriaId": "8498CA51-FFF7-4B4D-A81A-F6B0D92A9264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ED036CD-01B7-4274-9DF8-5E74C7420F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*",
              "matchCriteriaId": "62030EAD-35C5-4297-96C1-253437FF4E43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B7F7B8-B6FA-49E3-B8D0-A5B0D1179503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F067CC20-CF09-4112-BB27-311C4EC27240",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF4248B-A7A6-4467-B5B8-EAEB5512A4A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E14AD0-AB2C-4408-B0B3-E9A6FB50EFFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DEB6B0-314B-4939-BB1B-2F1E6AC3E860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB9A216-C879-4029-A491-B8CF3620B189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*",
              "matchCriteriaId": "66FFB3CF-AE82-43A7-B975-CF11979F1C77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AADD9EB-E088-4909-943F-E14BAF7F28C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBE018-24D0-49BB-BB61-45A022D360BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA2EAE17-3259-4ACD-B4E0-9B6F4F6A8F9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*",
              "matchCriteriaId": "942FA7D8-8132-45EA-9BC1-3AB3EAA8806A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE6271D-5378-49A6-9684-D4FBBDFEEFF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "83293AFA-9704-446D-85BE-6BC87EC7F573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6F7386-AC2A-443B-937A-044CD0655EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*",
              "matchCriteriaId": "61F45FFD-0C26-42B6-8240-CE8F624C7C80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*",
              "matchCriteriaId": "40DA60BC-F9F1-485F-9046-D75A5AE64903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D52AE7C-DBEA-4EE1-BEBA-75DF00A4C48B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B7A5F36-EED2-426E-AC51-7658B473738B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*",
              "matchCriteriaId": "92CE161D-80AA-4BF1-BB0E-24FC9A000BFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF88F072-4426-4454-8808-E6A72FE00185",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B0B1B1-C191-473C-AC86-340079491494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB534BC-20C2-4A1D-A484-1BD24F572D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB13DBE3-C404-4237-8B98-A14A22F90D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8A9669F-4850-4ABC-BFE7-B64C1067AE08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD49670-B3BB-49FD-B9F7-28684983AC75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D003EE-7A77-44C4-9813-BC5CA22CCE8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1B34ACE-188E-40AC-A1DC-E8A8BC89026F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*",
              "matchCriteriaId": "45D728C8-E17C-47F1-8D75-B7317CAE8DF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "27AB96DA-2282-485D-BE1A-6757F04FC25F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2343EDC-0E6D-44FE-92D4-AC08DDBBFBBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*",
              "matchCriteriaId": "3451722A-E369-466C-931F-F3C2CB32E001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*",
              "matchCriteriaId": "77028912-B962-476C-9D99-DF786D436B21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*",
              "matchCriteriaId": "54A1DB67-2F87-47EE-A41F-706E56C00573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*",
              "matchCriteriaId": "1949AB01-88BC-45A8-AF50-5B8BEA260384",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC4FB395-6E38-4371-A704-82676EDFBFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "2868B5C2-332A-4AF2-8BD9-21501C107B97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*",
              "matchCriteriaId": "958470B0-1501-4395-B97F-39EB3418B129",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3F20DEB-5C88-4634-B974-57F2A37ACED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B582DA0-97AD-4D2F-AB47-58B9CEC289DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4055D38F-BD52-4EE1-9AB5-708035D6875E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*",
              "matchCriteriaId": "688C7DA4-0C61-437B-925F-4134FD2A397F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A68709FF-9E1C-4174-A925-70A88D4376A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CE6217-242E-46F5-8CE1-D22D6C7FC204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCA2F795-A63D-4694-A393-214F732B30AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E01AEA5-2389-4CE5-9ADA-9C914E4BD88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F78FDC5-9A77-4859-AD7C-9FA9E4706C36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECA09D7-18BA-4104-A31E-3D96C0C6501E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*",
              "matchCriteriaId": "63FBD4E3-5381-4325-B5B5-1071FDC28BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9040CB-120C-4534-9372-F1E66F7F3C5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D2B187-79F3-49BC-A9CF-623387207C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDBB8516-64A7-404D-996F-1016866F87FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "F657CB06-388E-497F-8628-973A1C0EDC9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "F425853E-ECFB-4867-A38F-E35BAF076C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8654BB-D300-4040-9C03-F27ADEEEDF99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC97DEE9-2280-4A83-99C6-A3B23187843C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "4626703D-6486-4999-A2CD-8040F62D2E4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "909E2AF2-DFD2-4AD7-BA16-E356A0FED753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*",
              "matchCriteriaId": "50055CE8-FDAB-4AF8-9066-9256B48F5DE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*",
              "matchCriteriaId": "0716B752-F4BA-4713-823B-88B9A627177F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0E79EC-6E0B-4641-8D1B-DBC33A87A5F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "96994AC6-FF25-4818-BECC-567654965CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "22D857BC-8CCF-45A7-9855-06C210FDAEBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2593B2-0100-4693-A565-064AEC57B0C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5182DADD-8D18-402A-9E0A-E40FD682E4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F5DEC3-6589-46BA-AE6D-751BE679FE9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A58ED692-8BED-4877-9BC9-D41386B660C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADF4A9-4633-44CE-B5E1-84A202468C61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE8C16C7-D7B4-400A-997D-E2311188EE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*",
              "matchCriteriaId": "2563AC79-6822-47B5-81B1-7B8E0B89DFFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CCC4FFA-7667-4C15-931F-DDE0A906ECF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*",
              "matchCriteriaId": "684699EA-D32E-4E33-BAE5-95DD1125EC79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBB7D41-217D-4499-90F3-E8F196A13D54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF0069A6-C44E-4437-82C6-CB3A276DC0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "7590CB38-B8E7-41C6-A2E3-29C6B5EE044B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F3ABDFA-156D-4C26-B1B5-A443E7550E68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA5DCC1E-D02D-4AFD-B2C5-4DAF527609EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "621CCEC0-A80E-4838-B246-1F955AB35EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "1767A728-DD4D-4BEC-8177-7295DB246E03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E568A07-DD57-40AE-883E-3DE3B0CED74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C98D4F8-2BAF-42EF-BB4F-9B114DA729D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "034865C2-C8A1-4FB9-BDE8-7B05C9B47F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F467A7FC-B0F2-454C-825F-A9A685F8F9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "527370A7-4361-43D7-9B0C-1EC3658436A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8124C805-982B-422C-BCEB-BEEC1B6A883B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEABC547-7345-4DEB-99DB-5EDAB2C8B7DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E40DF15-0B29-42BD-88EC-7F5A19796690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*",
              "matchCriteriaId": "1271BFB9-7655-44D8-BF5C-AAEB5B191C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*",
              "matchCriteriaId": "18627C53-7136-434E-AAAC-0E91714597EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C3544AA-D3C3-4B79-B102-AF8C8DB8FDB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9C00440-F202-43C2-9FE1-D7B1B46BA0F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CF1DB39-2C29-4102-A824-2ABA83A9D3FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F37C402-C5B8-44D9-9C46-2E8CA5601F7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "9159B699-1785-4B78-81E7-0B2C06914663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE20FF5-BCFC-4875-9D8F-D629CFE23F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA6963D-FD64-41E7-854E-E8A1D1933BE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7413DAC-3D06-4BF9-86F6-AB252F544B6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "2121E3CD-830D-4AB5-85CD-518F847A1365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "A637C741-ADD4-47CF-AF0C-1BEC88FD3491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7DA000-8759-4891-AA86-AD5C8198C942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B429F2A-F96F-48F2-9338-2352A7A591C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F279F7E4-0792-49EF-8350-6BCEAC47EC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "092A87B2-9DDC-4E0E-8E24-ABEF302237C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5B8443A-558E-4A88-8C2D-9864698B1861",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D34B75B-37AD-4BDB-8443-2488A1724A36",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "94041F48-9513-46D7-BC87-C6C3BFAA7CCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E934A38-A846-4E8E-B363-504F28B16084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FCCB0C7-5936-4080-9C81-636F6C2F54DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8D8CAA4-B4B1-4D84-B7EE-7F5AF90E1A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
              "matchCriteriaId": "6384012E-37D8-4F16-9AA9-2A4EBFA5C10B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E8A40C-20BE-4338-BBE8-0DC20FCF7104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E69FE58-F3E4-4EB7-BC93-8473A92349B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAB4306-2BED-4D72-B749-0560F43343B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "623B6384-EC71-433F-B847-9C3EBB6245BD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71DCB864-FE1B-4807-9E33-A704BFBAA7F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CC1FF3E-A3F2-4D3C-A78F-B54110CEAA37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "C312637E-2B50-4D63-9927-02020BFE8CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "70E3A131-B5C2-48B8-AD39-37A4902E2EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "046FD7A6-B680-4E05-AA82-E8EAA26706D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF13E364-E24E-40DD-AE5E-218A22B243EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "0097488A-1187-44CD-BF82-1ADAF2B8FF78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "314A8BD9-6E5C-427D-AF90-957CAA63509B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E3707B5-2AE7-4A9C-8E55-3E86AB6B9CE1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EAD666B-4533-4A31-BADC-2D7469407BC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "B441A998-B9B8-43C1-8EBE-30198327E062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "26B056FD-D248-4DD3-8297-CC1C5FF13B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF78641C-2ABF-4C88-AE2B-11E8A1647E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "314BD69C-5F1C-417D-8ACC-A4E84F78C9EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "18900675-4095-448A-AD52-4DA0772B303E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB400E10-3747-4855-811E-3A14209FBC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B7C50D1-F0C2-40B4-B9C2-10E9D0DD7A6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42D667-EC04-4129-8A0E-EF1546A84B96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "922BCDDA-FAAE-4720-857F-E168C9AF2B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4CA9B1-9650-4F3B-A0F3-52238CE58719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0A48568-D28E-459B-86D3-0BF350D0168C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "253A9E39-A256-461D-BFD5-F9B6629089D0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*",
              "matchCriteriaId": "994839C2-DE0D-4FFD-8660-D24FCDE9099F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C71CFF2-3A4B-4931-B457-C5D849EA0A74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B12FE8-3D35-413E-AC7A-866F1A81455C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*",
              "matchCriteriaId": "C77AF8B9-54EE-4AF0-B9AB-2468070EDC8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C59007-3FB7-49A2-8ABD-8A9FE7F2005B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "170B98F3-FDD2-41E4-96B2-E1B15FAC60E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ACE6398-CDE1-4F39-8F79-54804A27514F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "39C668B1-088F-4E5F-A380-2AD1C117EBA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4A08F66-354F-4B91-AD0B-F7680202F00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "72E59FD0-FA4F-4C38-9B3F-557FD7097DF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "20683E6D-7C66-4240-B322-372DF2D3B4E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6EB7F3-F04C-4838-A866-3417850FED65",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A95CA09-88DF-4EA4-920F-3CC7574A8FCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA3018C-C09D-4C46-8566-7D8C98B244B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C568BC9-B999-4C14-B898-9EFEC0DC761D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA498493-3508-4C38-8591-D9F1EC045578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB552A67-C220-4E5F-94DA-1ACEEEE59F51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*",
              "matchCriteriaId": "311CA367-C6E5-4982-B06A-45329E0CF428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CEA6B95-5836-44FC-954F-C7B726844449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DFCB81-F308-4EEC-AD5D-5225D025C167",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82BCBDF-4F07-47F1-BB91-6148E2403133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC865317-D874-469D-AE84-7700B0F1485C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo SIP de algunos productos Huawei presenta una vulnerabilidad de denegaci\u00f3n de servicio (DoS). Un atacante remoto podr\u00eda explotar estas tres vulnerabilidades mediante el env\u00edo de los mensajes especialmente dise\u00f1ados hacia el dispositivo afectado. Debido a una verificaci\u00f3n insuficiente de los paquetes, una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar desbordamiento del b\u00fafer y un bucle muerto, conllevando a una condici\u00f3n DoS. Los productos afectados pueden ser encontrados en https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
    }
  ],
  "id": "CVE-2019-19416",
  "lastModified": "2024-11-21T04:34:44.310",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-08T17:15:09.577",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        },
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei max_presence_firmware v100r001c00
huawei max_presence -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei rp200_firmware v500r002c00spc200
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v500r002c00t
huawei smc2.0_firmware v600r006c00
huawei smc2.0_firmware v600r006c00t
huawei smc2.0 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42376C56-573F-4A88-B18E-43F636B17B41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D6C34F-ED85-461D-89AF-3B8C439867FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A35FE7-D526-455A-934B-08D54A0302A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DBC628-F348-4204-B212-11E8E6A0AC8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B487D436-B96E-4781-AFFD-2136154F9166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4072905-CA96-44F9-8868-BB20BDC56EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE13681-CF1A-4765-B35A-E6E674C334B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C579A9-2768-4202-9171-BC803554E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "51387999-E9D0-497F-A309-CA5E3126EB00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0AF0C0-46BF-4984-8378-954DF82EE227",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E57098-7E8D-4956-82E6-1474A50569C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871106B-D3AF-4CFB-A544-1FA411642428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F3483B2-9EB6-4E34-900A-945C04A3160D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "3103CC5F-E44E-49D8-A100-45476CD24A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A51677-9D99-491C-B524-C5ED5774AC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B55442-9A8C-4291-9086-17516814DFD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "84477B1C-413A-4F74-86DC-55E58AD07AB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15C564B-B409-4304-AF39-AD971BC8E82B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E933011-8C8D-47C2-BD80-1D7D040755F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4D17C34-47FB-478A-BB12-5F7C68045120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "80411236-6B22-4937-87F3-E06C991B14D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A8E1096-F070-4CE9-B2B4-6368890706A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B469A91-4CD0-44D2-A982-3E612B855E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1856722C-597D-495D-AFCC-21E5FF6F2359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "728A7B78-6E19-4656-848F-269DB955070C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "946F5FF7-412F-40F9-A492-DE8E11E7B919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D5066C9-7581-4284-AF23-0782870B2F03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "875441DD-575F-4F4D-A6BD-23C38641D330",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC535D5-0C05-4695-976F-ACF447431A6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "67731A77-1DD4-49B2-B437-2850C9583750",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98275088-2FBE-42F4-AAEC-DF02950B803D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "649BB696-BDBE-46FC-A23D-287DE306D8BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD9417D-0515-4B21-AD32-E6B137575D01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "611E69A3-AB62-4584-B611-93583D84FCB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F64B04C-27B1-4621-86B3-827D6F83D3B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "0892BC18-F3D0-4B0A-8F6D-E0C2A98E8A71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C216CE3-3481-4F96-9D10-15B627929046",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46EE0FA6-7E53-488F-81A7-B2C906D65552",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C80D3BB-868B-461C-B97A-9C94C9F80858",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "019D2365-8BD9-4243-97CC-22264F30A24E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD8D36D-A4F2-4423-B57E-E9933710201E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "353AFD36-2046-4E75-96FB-CBA7071C3257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC78B8F-B4BC-429D-9685-C30B47810B32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D137236-B70C-4AC9-A041-5857FE01F293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E335D2-FE4B-4316-8827-4741EC9AA674",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F5005B-13E9-49EB-82A1-9A03F3583037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D588964F-A5F2-4D5C-AE5D-17962E599370",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3189382E-6846-4713-A92F-ABD03683F4A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3983A57-2F07-4D21-9093-1DFEAB310E26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DEA387B-4F45-438F-8086-6E80B553163C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "018039EB-7265-4B71-B462-4734FD1D0503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "931FD3B3-A333-4277-AE55-494F5DB9F09F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC9042-0485-437F-811F-F8898B3B7EA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A29049D-F472-4772-8750-20730DA624E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492DABB3-66CF-47E9-92D4-518154559A7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "22007E6A-68FC-4AF4-A570-95873AFBF882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D1A4CC-2F7E-40AF-8874-EE3986176623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60030EDB-682F-4107-80FC-5F03CE75131D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "24845D47-3AF8-43BA-9844-6529F8DAABD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02 y V100R011C03 tienen una vulnerabilidad de lectura fuera de l\u00edmites en el protocolo H323. Un atacante remoto no autenticado podr\u00eda enviar paquetes manipulados a los productos afectados. Dada la verificaci\u00f3n insuficiente de los paquetes, una explotaci\u00f3n exitosa podr\u00eda hacer que el proceso se reinicie."
    }
  ],
  "id": "CVE-2017-15331",
  "lastModified": "2024-11-21T03:14:28.733",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-15T16:29:00.330",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-01-13 23:15
Modified
2024-11-21 05:40
Summary
There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products.
Impacted products
Vendor Product Version
huawei smc2.0_firmware v600r006c00spc700
huawei smc2.0_firmware v600r006c00spc800
huawei smc2.0_firmware v600r006c10spc500
huawei smc2.0_firmware v600r006c10spc600
huawei smc2.0_firmware v600r006c10spc601
huawei smc2.0_firmware v600r006c10spc602
huawei smc2.0_firmware v600r006c10spc700
huawei smc2.0_firmware v600r006c10spc800
huawei smc2.0_firmware v600r006c10spca00
huawei smc2.0_firmware v600r006c10spcb00
huawei smc2.0_firmware v600r006c10spcc00
huawei smc2.0_firmware v600r006c10spcd00
huawei smc2.0_firmware v600r006c10spce00
huawei smc2.0_firmware v600r019c00
huawei smc2.0_firmware v600r019c10
huawei smc2.0 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "B91154A8-B34B-4779-9C40-4E0595D818E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CDEF71-90EA-4A53-8BBC-1E7D36056A0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "8957BBAB-E512-4578-B9E3-8B49847345A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A935C9-89F2-449D-A669-50DF89BF973B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc601:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9DB7573-826B-486F-9701-031EB47C12A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc602:*:*:*:*:*:*:*",
              "matchCriteriaId": "3550CDB5-94D4-4C3E-B771-531A76B5F42C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "926EF8A5-0C3B-4AAF-BFE5-E683218EA0DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "96EECF70-BE93-4DAE-A15A-6E99172A534E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "893825D5-042C-41E1-A1BB-29362AE39C76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "649A0ECA-19FA-446F-9EF6-5F54064779CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spcc00:*:*:*:*:*:*:*",
              "matchCriteriaId": "82BBAD61-5012-44DE-BAAA-94A58B1105DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spcd00:*:*:*:*:*:*:*",
              "matchCriteriaId": "980A8185-F674-4096-8B21-B47642FF4791",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spce00:*:*:*:*:*:*:*",
              "matchCriteriaId": "678B2613-3F32-493B-99C5-DE400AE2B6B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r019c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2DC0656-EE97-43AF-9499-7ED8E31D6458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r019c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C32980F5-E091-4B2F-A8D3-F30367C8B9C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad de escalada de privilegios en el producto SMC2.0.\u0026#xa0;Algunos archivos en un directorio de un m\u00f3dulo est\u00e1n ubicados inapropiadamente.\u0026#xa0;No aplica la limitaci\u00f3n de directorio.\u0026#xa0;Unos atacantes pueden explotar esta vulnerabilidad al dise\u00f1ar archivos maliciosos para iniciar una escalada de privilegios.\u0026#xa0;Esto puede comprometer el servicio normal de los productos afectados"
    }
  ],
  "id": "CVE-2020-9209",
  "lastModified": "2024-11-21T05:40:10.383",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-01-13T23:15:13.807",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:33
Summary
Huawei SMC2.0 with software of V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00, V600R006C00 has an input validation vulnerability when handle TLS and DTLS handshake with certificate. Due to the insufficient validation of received PKI certificates, remote attackers could exploit this vulnerability to crash the TLS module.
Impacted products
Vendor Product Version
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00spc100
huawei smc2.0_firmware v100r005c00spc101b001t
huawei smc2.0_firmware v100r005c00spc102
huawei smc2.0_firmware v100r005c00spc103
huawei smc2.0_firmware v100r005c00spc200
huawei smc2.0_firmware v100r005c00spc201t
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v600r006c00
huawei smc2.0 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "2075745B-5A7D-47AC-8E3B-98F2AF49381B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9F838DA-3682-47DC-9058-ABAA6327885F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A94E752-CF8C-40EF-9499-309616765C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C4F484-8300-4793-AE06-EC8D8730B93C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5F6D278-95B6-4451-A252-AD870F61026C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF2AFB6B-038E-4F72-9875-7AC320ECB68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei SMC2.0 with software of V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00, V600R006C00 has an input validation vulnerability when handle TLS and DTLS handshake with certificate. Due to the insufficient validation of received PKI certificates, remote attackers could exploit this vulnerability to crash the TLS module."
    },
    {
      "lang": "es",
      "value": "Huawei SMC 2.0 con software V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00 y V600R006C00 tiene una vulnerabilidad de validaci\u00f3n de entradas al gestionar una negociaci\u00f3n TLS y DTLS con un certificado. Debido a la insuficiente validaci\u00f3n de los certificados PKI recibidos, los atacantes remotos pueden explotar esta vulnerabilidad para cerrar inesperadamente el m\u00f3dulo TLS."
    }
  ],
  "id": "CVE-2017-8213",
  "lastModified": "2024-11-21T03:33:32.940",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-11-22T19:29:05.477",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:33
Summary
AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v600r006c00
huawei smc2.0 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42376C56-573F-4A88-B18E-43F636B17B41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D6C34F-ED85-461D-89AF-3B8C439867FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A35FE7-D526-455A-934B-08D54A0302A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DBC628-F348-4204-B212-11E8E6A0AC8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B487D436-B96E-4781-AFFD-2136154F9166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4072905-CA96-44F9-8868-BB20BDC56EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE13681-CF1A-4765-B35A-E6E674C334B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C579A9-2768-4202-9171-BC803554E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "51387999-E9D0-497F-A309-CA5E3126EB00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "611E69A3-AB62-4584-B611-93583D84FCB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0AF0C0-46BF-4984-8378-954DF82EE227",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E57098-7E8D-4956-82E6-1474A50569C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable."
    },
    {
      "lang": "es",
      "value": "AR120-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR1200 con software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR1200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR150 con software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR150-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR160 con software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR200 con software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30; AR200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR2200 con software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR2200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR3200 con software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30; AR510 con software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30; NetEngine16EX con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; SMC2.0 con software V100R003C10, V100R005C00, V500R002C00, V600R006C00; SRG1300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; SRG2300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; y SRG3300 con software V200R006C10, V200R007C00, V200R008C20, V200R008C30 tienen una vulnerabilidad de denegaci\u00f3n de servicio (DoS). A causa de una l\u00f3gica de procesamiento de mensajes mal formados incorrecta, un atacante remoto autenticado podr\u00eda enviar un mensaje especialmente manipulado al dispositivo objetivo. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar un desbordamiento de pila y hacer que un servicio no est\u00e9 disponible."
    }
  ],
  "id": "CVE-2017-8162",
  "lastModified": "2024-11-21T03:33:26.677",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-11-22T19:29:03.773",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei max_presence_firmware v100r001c00
huawei max_presence -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei rp200_firmware v500r002c00spc200
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v500r002c00t
huawei smc2.0_firmware v600r006c00
huawei smc2.0_firmware v600r006c00t
huawei smc2.0 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42376C56-573F-4A88-B18E-43F636B17B41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D6C34F-ED85-461D-89AF-3B8C439867FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A35FE7-D526-455A-934B-08D54A0302A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DBC628-F348-4204-B212-11E8E6A0AC8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B487D436-B96E-4781-AFFD-2136154F9166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4072905-CA96-44F9-8868-BB20BDC56EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE13681-CF1A-4765-B35A-E6E674C334B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C579A9-2768-4202-9171-BC803554E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "51387999-E9D0-497F-A309-CA5E3126EB00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0AF0C0-46BF-4984-8378-954DF82EE227",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E57098-7E8D-4956-82E6-1474A50569C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871106B-D3AF-4CFB-A544-1FA411642428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F3483B2-9EB6-4E34-900A-945C04A3160D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "3103CC5F-E44E-49D8-A100-45476CD24A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A51677-9D99-491C-B524-C5ED5774AC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B55442-9A8C-4291-9086-17516814DFD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "84477B1C-413A-4F74-86DC-55E58AD07AB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15C564B-B409-4304-AF39-AD971BC8E82B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E933011-8C8D-47C2-BD80-1D7D040755F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4D17C34-47FB-478A-BB12-5F7C68045120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "80411236-6B22-4937-87F3-E06C991B14D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A8E1096-F070-4CE9-B2B4-6368890706A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B469A91-4CD0-44D2-A982-3E612B855E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1856722C-597D-495D-AFCC-21E5FF6F2359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "728A7B78-6E19-4656-848F-269DB955070C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "946F5FF7-412F-40F9-A492-DE8E11E7B919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D5066C9-7581-4284-AF23-0782870B2F03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "875441DD-575F-4F4D-A6BD-23C38641D330",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC535D5-0C05-4695-976F-ACF447431A6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "67731A77-1DD4-49B2-B437-2850C9583750",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98275088-2FBE-42F4-AAEC-DF02950B803D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "649BB696-BDBE-46FC-A23D-287DE306D8BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD9417D-0515-4B21-AD32-E6B137575D01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "611E69A3-AB62-4584-B611-93583D84FCB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F64B04C-27B1-4621-86B3-827D6F83D3B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "0892BC18-F3D0-4B0A-8F6D-E0C2A98E8A71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C216CE3-3481-4F96-9D10-15B627929046",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46EE0FA6-7E53-488F-81A7-B2C906D65552",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C80D3BB-868B-461C-B97A-9C94C9F80858",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "019D2365-8BD9-4243-97CC-22264F30A24E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD8D36D-A4F2-4423-B57E-E9933710201E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "353AFD36-2046-4E75-96FB-CBA7071C3257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC78B8F-B4BC-429D-9685-C30B47810B32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D137236-B70C-4AC9-A041-5857FE01F293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E335D2-FE4B-4316-8827-4741EC9AA674",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F5005B-13E9-49EB-82A1-9A03F3583037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D588964F-A5F2-4D5C-AE5D-17962E599370",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3189382E-6846-4713-A92F-ABD03683F4A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3983A57-2F07-4D21-9093-1DFEAB310E26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DEA387B-4F45-438F-8086-6E80B553163C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "018039EB-7265-4B71-B462-4734FD1D0503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "931FD3B3-A333-4277-AE55-494F5DB9F09F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC9042-0485-437F-811F-F8898B3B7EA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A29049D-F472-4772-8750-20730DA624E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492DABB3-66CF-47E9-92D4-518154559A7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "22007E6A-68FC-4AF4-A570-95873AFBF882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D1A4CC-2F7E-40AF-8874-EE3986176623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60030EDB-682F-4107-80FC-5F03CE75131D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "24845D47-3AF8-43BA-9844-6529F8DAABD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02 y V100R011C03 tienen una vulnerabilidad de fuga de memoria en el protocolo H323. Esta vulnerabilidad se debe a una protecci\u00f3n de de verificaci\u00f3n de paquetes insuficiente. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad enviando paquetes manipulados. Una explotaci\u00f3n con \u00e9xito podr\u00eda provocar una fuga de memoria y una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado."
    }
  ],
  "id": "CVE-2017-15332",
  "lastModified": "2024-11-21T03:14:28.893",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-15T16:29:00.377",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-772"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-07-08 17:15
Modified
2024-11-21 04:34
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r007c00spc600
huawei ar510_firmware v200r007c00spc900
huawei ar510_firmware v200r007c00spcb00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei smc2.0_firmware v100r003c00spc200t
huawei smc2.0_firmware v100r003c00spc300t
huawei smc2.0_firmware v100r003c00spc301t
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00spc100
huawei smc2.0_firmware v100r005c00spc101b001t
huawei smc2.0_firmware v100r005c00spc102
huawei smc2.0_firmware v100r005c00spc103
huawei smc2.0_firmware v100r005c00spc200
huawei smc2.0_firmware v100r005c00spc201t
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v600r006c00
huawei smc2.0 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01spc500
huawei semg9811_firmware v300r001c01spc500t
huawei semg9811_firmware v300r001c01spc700
huawei semg9811_firmware v300r001c01spca00
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei softco_firmware v200r001c01spc300
huawei softco_firmware v200r001c01spc400
huawei softco_firmware v200r001c01spc500
huawei softco_firmware v200r001c01spc600
huawei softco_firmware v200r001c01sph703
huawei softco_firmware v200r003c00spc100
huawei softco_firmware v200r003c00spc200
huawei softco_firmware v200r003c00spc500
huawei softco_firmware v200r003c20
huawei softco -
huawei te30_firmware v100r001c02spc100
huawei te30_firmware v100r001c02spc200
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00spc200
huawei te30_firmware v500r002c00spc600
huawei te30_firmware v500r002c00spc700
huawei te30_firmware v500r002c00spc900
huawei te30_firmware v500r002c00spcb00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00spc600
huawei te40_firmware v500r002c00spc700
huawei te40_firmware v500r002c00spc900
huawei te40_firmware v500r002c00spcb00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00spc600
huawei te50_firmware v500r002c00spcb00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01spc100
huawei te60_firmware v100r001c10
huawei te60_firmware v100r001c10spc300
huawei te60_firmware v100r001c10spc400
huawei te60_firmware v100r001c10spc500
huawei te60_firmware v100r001c10spc600
huawei te60_firmware v100r001c10spc800
huawei te60_firmware v100r003c00
huawei te60_firmware v500r002c00
huawei te60_firmware v500r002c00spc100
huawei te60_firmware v500r002c00spc200
huawei te60_firmware v500r002c00spc300
huawei te60_firmware v500r002c00spc600
huawei te60_firmware v500r002c00spc700
huawei te60_firmware v500r002c00spc800
huawei te60_firmware v500r002c00spc900
huawei te60_firmware v500r002c00spca00
huawei te60_firmware v500r002c00spcb00
huawei te60_firmware v600r006c00
huawei te60_firmware v600r006c00spc200
huawei te60 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -
huawei usg9500_firmware v300r001c01
huawei usg9500_firmware v300r001c20
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01spc800pwe
huawei usg9520 -
huawei usg9560_firmware v300r001c20spc300
huawei usg9560 -
huawei vp9660_firmware v200r001c02spc100
huawei vp9660_firmware v200r001c02spc200
huawei vp9660_firmware v200r001c02spc300
huawei vp9660_firmware v200r001c02spc300t
huawei vp9660_firmware v200r001c02spc400
huawei vp9660_firmware v200r001c30spc100
huawei vp9660_firmware v200r001c30spc100b015t
huawei vp9660_firmware v200r001c30spc101
huawei vp9660_firmware v200r001c30spc101tb015
huawei vp9660_firmware v200r001c30spc102t
huawei vp9660_firmware v200r001c30spc103t
huawei vp9660_firmware v200r001c30spc104t
huawei vp9660_firmware v200r001c30spc200
huawei vp9660_firmware v200r001c30spc200b022t
huawei vp9660_firmware v200r001c30spc201b023t
huawei vp9660_firmware v200r001c30spc202b025t
huawei vp9660_firmware v200r001c30spc203t
huawei vp9660_firmware v200r001c30spc206t
huawei vp9660_firmware v200r001c30spc207t
huawei vp9660_firmware v200r001c30spc208t
huawei vp9660_firmware v200r001c30spc209t
huawei vp9660_firmware v200r001c30spc300
huawei vp9660_firmware v200r001c30spc400
huawei vp9660_firmware v200r001c30spc400b001
huawei vp9660_firmware v200r001c30spc400t
huawei vp9660_firmware v200r001c30spc401t
huawei vp9660_firmware v200r001c30spc402t
huawei vp9660_firmware v200r001c30spc403t
huawei vp9660_firmware v200r001c30spc404t
huawei vp9660_firmware v200r001c30spc405t
huawei vp9660_firmware v200r001c30spc600
huawei vp9660_firmware v200r001c30spc700
huawei vp9660_firmware v200r001c30spc700t
huawei vp9660_firmware v200r001c30spc701t
huawei vp9660_firmware v200r001c30spc702t
huawei vp9660_firmware v200r001c30spc703t
huawei vp9660_firmware v200r001c30spc800
huawei vp9660_firmware v200r001c30spc800t
huawei vp9660_firmware v200r001c30spc900
huawei vp9660_firmware v200r001c30spca00
huawei vp9660_firmware v200r001c30spca00t
huawei vp9660_firmware v200r001c30spca01
huawei vp9660_firmware v200r001c30spca01t
huawei vp9660_firmware v200r001c30spca02t
huawei vp9660_firmware v200r001c30spcb00
huawei vp9660_firmware v200r001c30spcc00
huawei vp9660_firmware v200r001c30spcd00
huawei vp9660_firmware v200r001c30spcd00t
huawei vp9660_firmware v200r001c30spcd01t
huawei vp9660_firmware v200r001c30spcd02t
huawei vp9660_firmware v200r001c30spcd03t
huawei vp9660_firmware v200r001c30spcd04t
huawei vp9660_firmware v200r001c30spcd05t
huawei vp9660_firmware v200r001c30spce00
huawei vp9660_firmware v200r001c30spce01t
huawei vp9660_firmware v200r001c30spcf00
huawei vp9660_firmware v200r001c30spcg00
huawei vp9660_firmware v200r001c30spch00
huawei vp9660_firmware v200r001c30spci00
huawei vp9660_firmware v200r001c30spcj00
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c00spc001t
huawei vp9660_firmware v500r002c00spc200
huawei vp9660_firmware v500r002c00spc200t
huawei vp9660_firmware v500r002c00spc201t
huawei vp9660_firmware v500r002c00spc203t
huawei vp9660_firmware v500r002c00spc204t
huawei vp9660_firmware v500r002c00spc205t
huawei vp9660_firmware v500r002c00spc206t
huawei vp9660_firmware v500r002c00spc300
huawei vp9660_firmware v500r002c00spc400
huawei vp9660_firmware v500r002c00spc500
huawei vp9660_firmware v500r002c00spc600
huawei vp9660_firmware v500r002c00spc700
huawei vp9660_firmware v500r002c00spc800
huawei vp9660_firmware v500r002c00spc900
huawei vp9660_firmware v500r002c00spc900t
huawei vp9660_firmware v500r002c00spc901t
huawei vp9660_firmware v500r002c00spca00
huawei vp9660_firmware v500r002c00spcb00
huawei vp9660_firmware v500r002c00spcb01t
huawei vp9660_firmware v500r002c00spcc00
huawei vp9660_firmware v500r002c00spcd00
huawei vp9660_firmware v500r002c00t
huawei vp9660_firmware v500r002c10
huawei vp9660_firmware v500r002c10spc100
huawei vp9660_firmware v500r002c10spc100t
huawei vp9660_firmware v500r002c10t
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03b013sp02
huawei viewpoint_8660_firmware v100r008c03b013sp03
huawei viewpoint_8660_firmware v100r008c03b013sp04
huawei viewpoint_8660_firmware v100r008c03spc100
huawei viewpoint_8660_firmware v100r008c03spc200
huawei viewpoint_8660_firmware v100r008c03spc300
huawei viewpoint_8660_firmware v100r008c03spc400
huawei viewpoint_8660_firmware v100r008c03spc500
huawei viewpoint_8660_firmware v100r008c03spc600
huawei viewpoint_8660_firmware v100r008c03spc700
huawei viewpoint_8660_firmware v100r008c03spc800
huawei viewpoint_8660_firmware v100r008c03spc900
huawei viewpoint_8660_firmware v100r008c03spca00
huawei viewpoint_8660_firmware v100r008c03spcb00
huawei viewpoint_8660_firmware v100r008c03spcc00
huawei viewpoint_8660 -
huawei viewpoint_9030_firmware v100r011c02spc100
huawei viewpoint_9030_firmware v100r011c03b012sp15
huawei viewpoint_9030_firmware v100r011c03b012sp16
huawei viewpoint_9030_firmware v100r011c03b015sp03
huawei viewpoint_9030_firmware v100r011c03lgwl01spc100
huawei viewpoint_9030_firmware v100r011c03lgwl01spc100b012
huawei viewpoint_9030_firmware v100r011c03spc100
huawei viewpoint_9030_firmware v100r011c03spc200
huawei viewpoint_9030_firmware v100r011c03spc300
huawei viewpoint_9030_firmware v100r011c03spc400
huawei viewpoint_9030_firmware v100r011c03spc500
huawei viewpoint_9030 -
huawei espace_u1910_firmware v100r001c20spc300
huawei espace_u1910_firmware v100r001c20spc400
huawei espace_u1910_firmware v100r001c20spc500
huawei espace_u1910_firmware v100r001c20spc600
huawei espace_u1910_firmware v100r001c20sph703
huawei espace_u1910_firmware v200r003c00
huawei espace_u1910_firmware v200r003c20
huawei espace_u1910_firmware v200r003c30
huawei espace_u1910 -
huawei espace_u1911_firmware v100r001c20spc300
huawei espace_u1911_firmware v100r001c20spc400
huawei espace_u1911_firmware v100r001c20spc500
huawei espace_u1911_firmware v100r001c20spc600
huawei espace_u1911_firmware v100r001c20sph309
huawei espace_u1911_firmware v100r001c20sph703
huawei espace_u1911_firmware v200r003c00
huawei espace_u1911_firmware v200r003c20
huawei espace_u1911_firmware v200r003c30
huawei espace_u1911 -
huawei espace_u1930_firmware v100r001c20spc300
huawei espace_u1930_firmware v100r001c20spc400
huawei espace_u1930_firmware v100r001c20spc500
huawei espace_u1930_firmware v100r001c20spc600
huawei espace_u1930_firmware v100r001c20sph703
huawei espace_u1930_firmware v200r003c00
huawei espace_u1930_firmware v200r003c20
huawei espace_u1930_firmware v200r003c30
huawei espace_u1930 -
huawei espace_u1960_firmware v100r001c01spc500
huawei espace_u1960_firmware v100r001c20lcrw01t
huawei espace_u1960_firmware v100r001c20spc300
huawei espace_u1960_firmware v100r001c20spc400
huawei espace_u1960_firmware v100r001c20spc600
huawei espace_u1960_firmware v100r001c20spc600t
huawei espace_u1960_firmware v100r001c20sph309
huawei espace_u1960_firmware v100r001c20sph703
huawei espace_u1960_firmware v200r003c00
huawei espace_u1960_firmware v200r003c20
huawei espace_u1960_firmware v200r003c30
huawei espace_u1960 -
huawei espace_u1980_firmware v100r001c01spc500t
huawei espace_u1980_firmware v100r001c20spc300
huawei espace_u1980_firmware v100r001c20spc400
huawei espace_u1980_firmware v100r001c20spc500t
huawei espace_u1980_firmware v100r001c20spc502
huawei espace_u1980_firmware v100r001c20spc600
huawei espace_u1980_firmware v100r001c20sph309
huawei espace_u1980_firmware v100r001c20sph703
huawei espace_u1980_firmware v200r003c00
huawei espace_u1980_firmware v200r003c20
huawei espace_u1980_firmware v200r003c30
huawei espace_u1980 -
huawei espace_u1981_firmware v100r001c20spc300
huawei espace_u1981_firmware v100r001c20spc400
huawei espace_u1981_firmware v100r001c20spc500
huawei espace_u1981_firmware v100r001c20spc600
huawei espace_u1981_firmware v100r001c20spc700
huawei espace_u1981_firmware v100r001c20sph702
huawei espace_u1981_firmware v100r001c20sph703
huawei espace_u1981_firmware v100r001c30
huawei espace_u1981_firmware v200r003c00
huawei espace_u1981_firmware v200r003c20
huawei espace_u1981_firmware v200r003c30
huawei espace_u1981 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42376C56-573F-4A88-B18E-43F636B17B41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D6C34F-ED85-461D-89AF-3B8C439867FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "D86EA007-4A57-44D9-8867-C1587E785805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A35FE7-D526-455A-934B-08D54A0302A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DBC628-F348-4204-B212-11E8E6A0AC8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B487D436-B96E-4781-AFFD-2136154F9166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CFB676-658E-4DEF-8C29-13CA633D7270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B650408-1E40-49DF-9271-6248CC1DCC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4072905-CA96-44F9-8868-BB20BDC56EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE13681-CF1A-4765-B35A-E6E674C334B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
              "matchCriteriaId": "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C526D0-9638-4BF3-823E-48F758FD3B9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD9129C5-08E9-4689-8D19-478083484A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EDCE428-7453-4259-AAD9-091F0CF1413E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871106B-D3AF-4CFB-A544-1FA411642428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F3483B2-9EB6-4E34-900A-945C04A3160D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "94682861-8E53-408E-97F2-06A22DAC5466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A51677-9D99-491C-B524-C5ED5774AC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B55442-9A8C-4291-9086-17516814DFD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "84477B1C-413A-4F74-86DC-55E58AD07AB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "80411236-6B22-4937-87F3-E06C991B14D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A8E1096-F070-4CE9-B2B4-6368890706A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B469A91-4CD0-44D2-A982-3E612B855E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1856722C-597D-495D-AFCC-21E5FF6F2359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "728A7B78-6E19-4656-848F-269DB955070C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "946F5FF7-412F-40F9-A492-DE8E11E7B919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3D681F-E141-4BB1-9437-8BFE286CB164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D5066C9-7581-4284-AF23-0782870B2F03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "875441DD-575F-4F4D-A6BD-23C38641D330",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "51387999-E9D0-497F-A309-CA5E3126EB00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "649BB696-BDBE-46FC-A23D-287DE306D8BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD9417D-0515-4B21-AD32-E6B137575D01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC5100FF-B87F-4D3B-8B01-B9038028E436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B61BA3-EDFB-45C3-84C5-1581F6CEFF5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4145695-7ED4-4B0D-A30C-10A8183F323B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "2075745B-5A7D-47AC-8E3B-98F2AF49381B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9F838DA-3682-47DC-9058-ABAA6327885F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A94E752-CF8C-40EF-9499-309616765C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C4F484-8300-4793-AE06-EC8D8730B93C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5F6D278-95B6-4451-A252-AD870F61026C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF2AFB6B-038E-4F72-9875-7AC320ECB68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0AF0C0-46BF-4984-8378-954DF82EE227",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E57098-7E8D-4956-82E6-1474A50569C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C216CE3-3481-4F96-9D10-15B627929046",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46EE0FA6-7E53-488F-81A7-B2C906D65552",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C80D3BB-868B-461C-B97A-9C94C9F80858",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "019D2365-8BD9-4243-97CC-22264F30A24E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD8D36D-A4F2-4423-B57E-E9933710201E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB996A1-FFCC-478B-B2EA-5BF39B5217CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC8EF14-E249-49A4-8DD5-491EB1545040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "D81D19B4-82E0-48C4-A676-9D270B529F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98F49A2-2B7C-406E-BB2F-C5431427BA33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "219AF4A5-4134-4265-BF69-C340665714F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "353AFD36-2046-4E75-96FB-CBA7071C3257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC78B8F-B4BC-429D-9685-C30B47810B32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D137236-B70C-4AC9-A041-5857FE01F293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E335D2-FE4B-4316-8827-4741EC9AA674",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F5005B-13E9-49EB-82A1-9A03F3583037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D588964F-A5F2-4D5C-AE5D-17962E599370",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3189382E-6846-4713-A92F-ABD03683F4A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3983A57-2F07-4D21-9093-1DFEAB310E26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAED7AC3-F922-44FE-B29C-ED7383FC30E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB8B3C52-C668-43D7-875D-55047B26B4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3142B435-CE92-4D8A-B34B-E81B672359DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E990766D-FBD4-404E-A783-3D2D0BC210F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE469876-F873-4705-9760-097AE840A818",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ADD081E-6FDD-49A8-84B7-B90BE9FA3B19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA573F8-92CF-463C-B445-9C8B82069C89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EA327A0-4C37-4730-A8B4-E59DB15EFF1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED834B0-65AD-4905-A9EF-06DF505BC0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F233150-6AB0-4672-B20D-9B9DD7D5158F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5E62A6-34B0-4424-B4F7-0BB55890FB5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C57141-5167-4A45-B54B-E1724F414AAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "19732856-0E1C-4A37-83C2-4FE9E0DE260A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF191AC7-EB37-46BE-85EF-642D675BFC36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB0BB461-988A-4E55-BEFC-C5BB8245E751",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA493790-6452-4EBD-ABA4-8CC2AE4523C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E71665B-85F4-4914-812E-8E763FD5E9C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EEB3DB2-810A-4FB2-BE52-9694824F90F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "509AFB31-BF50-4AAA-AD42-309C86C0A9D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E11E0F5-C34B-4745-B6F0-8DF3522FA15B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "999D02AA-1B42-4B4E-BB7B-0B063DE5F2B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E5A0D4-E459-4230-94DB-E94946425071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "018039EB-7265-4B71-B462-4734FD1D0503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3C8433-FEA5-4784-8C0A-174C677AD50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "00F48D7B-BAAB-46F8-A428-5EC68EC34EA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6D177F9-8A65-4E1F-9576-D03171336510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "38671934-B566-4A73-9C97-C0236D4EEAFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "931FD3B3-A333-4277-AE55-494F5DB9F09F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "382868EB-07B6-448B-AF15-8C66046C9422",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71366A4-11F7-42F6-A1C7-A3D3E38E0ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "5547844C-BEDD-4819-8080-832AF545E80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "826F23F7-CD43-4C33-B08A-72D34DF152BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "2630F664-C5D1-4E38-9ABC-C5EEC0E61B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7B30D7-FD50-495D-B56D-BE29C6D42831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AF9B11-C3EE-482C-AD20-7482C87EDEF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC82CFB2-6CBD-47FE-9A9F-66B3FF36EFFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13F79BF-2919-45A3-9AB0-9D501DDA94B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC9042-0485-437F-811F-F8898B3B7EA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BD64645-CD8A-4FE3-9C28-E6001F210F3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "06047C06-B5D8-4495-A5E8-03FBC65AE2FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "D38CC7A1-D039-41BB-A795-95F5B877B9F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "18152B19-FD04-4983-B18A-0E362E8158F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "592AC67D-2210-46A4-9BB2-DA04C67E171B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FFE6C6E-BDF3-4841-9836-4C81A41F2129",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F0893C-8D47-43D7-A69B-E16F77E0F330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAA427C8-B75F-4C98-BCBF-5588409CDD18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "305174D3-15DE-4BAC-8AA6-699E487DDA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A29049D-F472-4772-8750-20730DA624E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "040454F6-FCDB-4320-8933-8F7DBB9956ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD78C2D6-13FA-4170-898D-D836C9DAE757",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "068AC8E5-1A15-4DF3-B021-557FA491AE38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "22007E6A-68FC-4AF4-A570-95873AFBF882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D1A4CC-2F7E-40AF-8874-EE3986176623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*",
              "matchCriteriaId": "A75EB727-3F43-4C93-BB8C-A115427A10F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60030EDB-682F-4107-80FC-5F03CE75131D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F14C758-4E82-41FF-9A75-EEBD18BE8882",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C0CBDFF-95C8-4558-8B3E-FF05AF23349C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BC5336A-313C-4FBE-B849-90FB0CD5BBBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "11F2C8F2-B1E0-4916-9D0A-DAAD8F7764E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFBFBF45-CC70-4C81-81FD-944F1534FE4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B92C07-6378-4B64-B69A-8690832C1EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "803E2C56-941D-4DF0-8758-0F82D7A61689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*",
              "matchCriteriaId": "D745C321-86C5-4CB0-93E1-6368CDB76F86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*",
              "matchCriteriaId": "67AFAEF7-C9B7-46B3-B862-AD038915AEA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF11CB1A-17B3-4A74-8B36-AF3A5D4DC70B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDD1DAC8-19FE-425D-BAA6-5B391B5D6319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A014E8-0166-4005-B753-3EA5661AFFA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*",
              "matchCriteriaId": "090529B7-53B6-4385-B766-B2D338E5D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "629ACAC7-E17A-488A-9E16-AD7CEB0EB5D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C48C037-451F-4BDA-BFEA-5A35E55BB7C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DF54BC9-26E9-450A-B96F-DD016DDDE39F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBF3A771-4F45-4240-A48D-4F66776D36D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*",
              "matchCriteriaId": "8498CA51-FFF7-4B4D-A81A-F6B0D92A9264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ED036CD-01B7-4274-9DF8-5E74C7420F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*",
              "matchCriteriaId": "62030EAD-35C5-4297-96C1-253437FF4E43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B7F7B8-B6FA-49E3-B8D0-A5B0D1179503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F067CC20-CF09-4112-BB27-311C4EC27240",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF4248B-A7A6-4467-B5B8-EAEB5512A4A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E14AD0-AB2C-4408-B0B3-E9A6FB50EFFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DEB6B0-314B-4939-BB1B-2F1E6AC3E860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB9A216-C879-4029-A491-B8CF3620B189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*",
              "matchCriteriaId": "66FFB3CF-AE82-43A7-B975-CF11979F1C77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AADD9EB-E088-4909-943F-E14BAF7F28C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBE018-24D0-49BB-BB61-45A022D360BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA2EAE17-3259-4ACD-B4E0-9B6F4F6A8F9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*",
              "matchCriteriaId": "942FA7D8-8132-45EA-9BC1-3AB3EAA8806A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE6271D-5378-49A6-9684-D4FBBDFEEFF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "83293AFA-9704-446D-85BE-6BC87EC7F573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6F7386-AC2A-443B-937A-044CD0655EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*",
              "matchCriteriaId": "61F45FFD-0C26-42B6-8240-CE8F624C7C80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*",
              "matchCriteriaId": "40DA60BC-F9F1-485F-9046-D75A5AE64903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D52AE7C-DBEA-4EE1-BEBA-75DF00A4C48B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B7A5F36-EED2-426E-AC51-7658B473738B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*",
              "matchCriteriaId": "92CE161D-80AA-4BF1-BB0E-24FC9A000BFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF88F072-4426-4454-8808-E6A72FE00185",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B0B1B1-C191-473C-AC86-340079491494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB534BC-20C2-4A1D-A484-1BD24F572D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB13DBE3-C404-4237-8B98-A14A22F90D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8A9669F-4850-4ABC-BFE7-B64C1067AE08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD49670-B3BB-49FD-B9F7-28684983AC75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D003EE-7A77-44C4-9813-BC5CA22CCE8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1B34ACE-188E-40AC-A1DC-E8A8BC89026F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*",
              "matchCriteriaId": "45D728C8-E17C-47F1-8D75-B7317CAE8DF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "27AB96DA-2282-485D-BE1A-6757F04FC25F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2343EDC-0E6D-44FE-92D4-AC08DDBBFBBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*",
              "matchCriteriaId": "3451722A-E369-466C-931F-F3C2CB32E001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*",
              "matchCriteriaId": "77028912-B962-476C-9D99-DF786D436B21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*",
              "matchCriteriaId": "54A1DB67-2F87-47EE-A41F-706E56C00573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*",
              "matchCriteriaId": "1949AB01-88BC-45A8-AF50-5B8BEA260384",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC4FB395-6E38-4371-A704-82676EDFBFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "2868B5C2-332A-4AF2-8BD9-21501C107B97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*",
              "matchCriteriaId": "958470B0-1501-4395-B97F-39EB3418B129",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3F20DEB-5C88-4634-B974-57F2A37ACED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B582DA0-97AD-4D2F-AB47-58B9CEC289DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4055D38F-BD52-4EE1-9AB5-708035D6875E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*",
              "matchCriteriaId": "688C7DA4-0C61-437B-925F-4134FD2A397F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A68709FF-9E1C-4174-A925-70A88D4376A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CE6217-242E-46F5-8CE1-D22D6C7FC204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCA2F795-A63D-4694-A393-214F732B30AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E01AEA5-2389-4CE5-9ADA-9C914E4BD88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F78FDC5-9A77-4859-AD7C-9FA9E4706C36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECA09D7-18BA-4104-A31E-3D96C0C6501E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*",
              "matchCriteriaId": "63FBD4E3-5381-4325-B5B5-1071FDC28BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9040CB-120C-4534-9372-F1E66F7F3C5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D2B187-79F3-49BC-A9CF-623387207C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDBB8516-64A7-404D-996F-1016866F87FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "F657CB06-388E-497F-8628-973A1C0EDC9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "F425853E-ECFB-4867-A38F-E35BAF076C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8654BB-D300-4040-9C03-F27ADEEEDF99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC97DEE9-2280-4A83-99C6-A3B23187843C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "4626703D-6486-4999-A2CD-8040F62D2E4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "909E2AF2-DFD2-4AD7-BA16-E356A0FED753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*",
              "matchCriteriaId": "50055CE8-FDAB-4AF8-9066-9256B48F5DE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*",
              "matchCriteriaId": "0716B752-F4BA-4713-823B-88B9A627177F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0E79EC-6E0B-4641-8D1B-DBC33A87A5F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "96994AC6-FF25-4818-BECC-567654965CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "22D857BC-8CCF-45A7-9855-06C210FDAEBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2593B2-0100-4693-A565-064AEC57B0C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5182DADD-8D18-402A-9E0A-E40FD682E4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F5DEC3-6589-46BA-AE6D-751BE679FE9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A58ED692-8BED-4877-9BC9-D41386B660C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADF4A9-4633-44CE-B5E1-84A202468C61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE8C16C7-D7B4-400A-997D-E2311188EE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*",
              "matchCriteriaId": "2563AC79-6822-47B5-81B1-7B8E0B89DFFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CCC4FFA-7667-4C15-931F-DDE0A906ECF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*",
              "matchCriteriaId": "684699EA-D32E-4E33-BAE5-95DD1125EC79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBB7D41-217D-4499-90F3-E8F196A13D54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF0069A6-C44E-4437-82C6-CB3A276DC0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "7590CB38-B8E7-41C6-A2E3-29C6B5EE044B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F3ABDFA-156D-4C26-B1B5-A443E7550E68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA5DCC1E-D02D-4AFD-B2C5-4DAF527609EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "621CCEC0-A80E-4838-B246-1F955AB35EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "1767A728-DD4D-4BEC-8177-7295DB246E03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E568A07-DD57-40AE-883E-3DE3B0CED74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C98D4F8-2BAF-42EF-BB4F-9B114DA729D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "034865C2-C8A1-4FB9-BDE8-7B05C9B47F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F467A7FC-B0F2-454C-825F-A9A685F8F9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "527370A7-4361-43D7-9B0C-1EC3658436A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8124C805-982B-422C-BCEB-BEEC1B6A883B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEABC547-7345-4DEB-99DB-5EDAB2C8B7DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E40DF15-0B29-42BD-88EC-7F5A19796690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*",
              "matchCriteriaId": "1271BFB9-7655-44D8-BF5C-AAEB5B191C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*",
              "matchCriteriaId": "18627C53-7136-434E-AAAC-0E91714597EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C3544AA-D3C3-4B79-B102-AF8C8DB8FDB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9C00440-F202-43C2-9FE1-D7B1B46BA0F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CF1DB39-2C29-4102-A824-2ABA83A9D3FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F37C402-C5B8-44D9-9C46-2E8CA5601F7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "9159B699-1785-4B78-81E7-0B2C06914663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE20FF5-BCFC-4875-9D8F-D629CFE23F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA6963D-FD64-41E7-854E-E8A1D1933BE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7413DAC-3D06-4BF9-86F6-AB252F544B6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "2121E3CD-830D-4AB5-85CD-518F847A1365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "A637C741-ADD4-47CF-AF0C-1BEC88FD3491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7DA000-8759-4891-AA86-AD5C8198C942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B429F2A-F96F-48F2-9338-2352A7A591C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F279F7E4-0792-49EF-8350-6BCEAC47EC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "092A87B2-9DDC-4E0E-8E24-ABEF302237C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5B8443A-558E-4A88-8C2D-9864698B1861",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D34B75B-37AD-4BDB-8443-2488A1724A36",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "94041F48-9513-46D7-BC87-C6C3BFAA7CCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E934A38-A846-4E8E-B363-504F28B16084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FCCB0C7-5936-4080-9C81-636F6C2F54DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8D8CAA4-B4B1-4D84-B7EE-7F5AF90E1A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
              "matchCriteriaId": "6384012E-37D8-4F16-9AA9-2A4EBFA5C10B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E8A40C-20BE-4338-BBE8-0DC20FCF7104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E69FE58-F3E4-4EB7-BC93-8473A92349B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAB4306-2BED-4D72-B749-0560F43343B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "623B6384-EC71-433F-B847-9C3EBB6245BD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71DCB864-FE1B-4807-9E33-A704BFBAA7F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CC1FF3E-A3F2-4D3C-A78F-B54110CEAA37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "C312637E-2B50-4D63-9927-02020BFE8CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "70E3A131-B5C2-48B8-AD39-37A4902E2EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "046FD7A6-B680-4E05-AA82-E8EAA26706D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF13E364-E24E-40DD-AE5E-218A22B243EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "0097488A-1187-44CD-BF82-1ADAF2B8FF78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "314A8BD9-6E5C-427D-AF90-957CAA63509B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E3707B5-2AE7-4A9C-8E55-3E86AB6B9CE1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EAD666B-4533-4A31-BADC-2D7469407BC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "B441A998-B9B8-43C1-8EBE-30198327E062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "26B056FD-D248-4DD3-8297-CC1C5FF13B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF78641C-2ABF-4C88-AE2B-11E8A1647E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "314BD69C-5F1C-417D-8ACC-A4E84F78C9EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "18900675-4095-448A-AD52-4DA0772B303E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB400E10-3747-4855-811E-3A14209FBC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B7C50D1-F0C2-40B4-B9C2-10E9D0DD7A6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42D667-EC04-4129-8A0E-EF1546A84B96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "922BCDDA-FAAE-4720-857F-E168C9AF2B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4CA9B1-9650-4F3B-A0F3-52238CE58719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0A48568-D28E-459B-86D3-0BF350D0168C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "253A9E39-A256-461D-BFD5-F9B6629089D0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*",
              "matchCriteriaId": "994839C2-DE0D-4FFD-8660-D24FCDE9099F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C71CFF2-3A4B-4931-B457-C5D849EA0A74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B12FE8-3D35-413E-AC7A-866F1A81455C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*",
              "matchCriteriaId": "C77AF8B9-54EE-4AF0-B9AB-2468070EDC8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C59007-3FB7-49A2-8ABD-8A9FE7F2005B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "170B98F3-FDD2-41E4-96B2-E1B15FAC60E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ACE6398-CDE1-4F39-8F79-54804A27514F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "39C668B1-088F-4E5F-A380-2AD1C117EBA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4A08F66-354F-4B91-AD0B-F7680202F00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "72E59FD0-FA4F-4C38-9B3F-557FD7097DF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "20683E6D-7C66-4240-B322-372DF2D3B4E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6EB7F3-F04C-4838-A866-3417850FED65",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A95CA09-88DF-4EA4-920F-3CC7574A8FCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA3018C-C09D-4C46-8566-7D8C98B244B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C568BC9-B999-4C14-B898-9EFEC0DC761D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA498493-3508-4C38-8591-D9F1EC045578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB552A67-C220-4E5F-94DA-1ACEEEE59F51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*",
              "matchCriteriaId": "311CA367-C6E5-4982-B06A-45329E0CF428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CEA6B95-5836-44FC-954F-C7B726844449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DFCB81-F308-4EEC-AD5D-5225D025C167",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82BCBDF-4F07-47F1-BB91-6148E2403133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC865317-D874-469D-AE84-7700B0F1485C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo SIP de algunos productos Huawei presenta una vulnerabilidad de denegaci\u00f3n de servicio (DoS). Un atacante remoto podr\u00eda explotar estas tres vulnerabilidades mediante el env\u00edo de los mensajes especialmente dise\u00f1ados hacia el dispositivo afectado. Debido a una verificaci\u00f3n insuficiente de los paquetes, una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar desbordamiento del b\u00fafer y un bucle muerto, conllevando a una condici\u00f3n DoS. Los productos afectados pueden ser encontrados en https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
    }
  ],
  "id": "CVE-2019-19417",
  "lastModified": "2024-11-21T04:34:44.617",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-08T17:15:09.640",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        },
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Severity ?
Summary
Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01, V300R001C00 have a weak cryptography vulnerability. Due to not properly some values in the certificates, an unauthenticated remote attacker could forges a specific RSA certificate and exploits the vulnerability to pass identity authentication and logs into the target device to obtain permissions configured for the specific user name.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r005c32
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s -
huawei ar1200_firmware v200r005c20
huawei ar1200_firmware v200r005c32
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200 -
huawei ar1200-s_firmware v200r005c32
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150 -
huawei ar160_firmware v200r005c32
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160 -
huawei ar200_firmware v200r005c32
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200 -
huawei ar200-s_firmware v200r005c32
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r007c01
huawei ar200-s_firmware v200r008c20
huawei ar200-s -
huawei ar2200_firmware v200r005c20
huawei ar2200_firmware v200r005c32
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200 -
huawei ar2200-s_firmware v200r005c32
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s -
huawei ar3200_firmware v200r005c32
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r005c32
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510 -
huawei cloudengine_12800_firmware v100r003c00
huawei cloudengine_12800_firmware v100r003c10
huawei cloudengine_12800_firmware v100r005c00
huawei cloudengine_12800_firmware v100r005c10
huawei cloudengine_12800_firmware v100r006c00
huawei cloudengine_12800_firmware v200r001c00
huawei cloudengine_12800 -
huawei cloudengine_5800_firmware v100r003c00
huawei cloudengine_5800_firmware v100r003c10
huawei cloudengine_5800_firmware v100r005c00
huawei cloudengine_5800_firmware v100r005c10
huawei cloudengine_5800_firmware v100r006c00
huawei cloudengine_5800_firmware v200r001c00
huawei cloudengine_5800 -
huawei cloudengine_6800_firmware v100r003c00
huawei cloudengine_6800_firmware v100r003c10
huawei cloudengine_6800_firmware v100r005c00
huawei cloudengine_6800_firmware v100r005c10
huawei cloudengine_6800_firmware v100r006c00
huawei cloudengine_6800_firmware v200r001c00
huawei cloudengine_6800 -
huawei cloudengine_7800_firmware v100r003c00
huawei cloudengine_7800_firmware v100r003c10
huawei cloudengine_7800_firmware v100r005c00
huawei cloudengine_7800_firmware v100r005c10
huawei cloudengine_7800_firmware v100r006c00
huawei cloudengine_7800_firmware v200r001c00
huawei cloudengine_7800 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00
huawei smc2.0_firmware v500r002c00
huawei smc2.0 -
huawei srg1300_firmware v200r005c32
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300 -
huawei srg2300_firmware v200r005c32
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300 -
huawei srg3300_firmware v200r005c32
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300 -
huawei te30_firmware v100r001c10
huawei te30 -
huawei te60_firmware v100r003c00
huawei te60_firmware v500r002c00
huawei te60 -
huawei vp9660_firmware v200r001c02
huawei vp9660_firmware v200r001c30
huawei vp9660_firmware v500r002c00
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c02
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -
huawei espace_iad_firmware v300r002c01
huawei espace_iad -
huawei espace_u1981_firmware v200r003c20
huawei espace_u1981_firmware v200r003c30
huawei espace_u1981 -
huawei espace_usm_firmware v100r001c01
huawei espace_usm_firmware v300r001c00
huawei espace_usm -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r005c32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D81E2517-263C-4B59-9D28-A3DE98289B24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r005c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F8934C1-9162-4C52-A0FC-6B2914E93304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r005c32:*:*:*:*:*:*:*",
              "matchCriteriaId": "4045CC4E-3B44-4E32-A04F-39C8572921B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r005c32:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE7D76DA-E30F-4071-807B-DED30596CD45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r005c32:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ABEF8DE-D6CA-45DD-B10E-C3FFB5B82FE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r005c32:*:*:*:*:*:*:*",
              "matchCriteriaId": "75A87025-03BE-4671-9687-85510E9AE4C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r005c32:*:*:*:*:*:*:*",
              "matchCriteriaId": "0325B983-F920-4006-8F3B-738B1B4EBEAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "F159E208-A535-4B5E-A7A5-791EB01C0839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r005c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "36DE9947-C096-4B7F-8F3E-748DEFC677C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r005c32:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DA92D38-95BA-4FEB-9A5E-A2604B97B6A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r005c32:*:*:*:*:*:*:*",
              "matchCriteriaId": "272E6F06-9FAF-421B-8E87-7F1F1705B598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FE26EE9-2331-4D72-96CF-635A0A4EBE3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CFB676-658E-4DEF-8C29-13CA633D7270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B650408-1E40-49DF-9271-6248CC1DCC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r005c32:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CA6C55E-DF1F-475D-B1E9-C09CF8278276",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C579A9-2768-4202-9171-BC803554E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AEB5929-1526-4910-BE22-07FCDDA06D0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C4D77D6-4CCA-45A3-8B8F-2A2E3AD82753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E58D7203-2EE3-412A-B39C-94D82B0BBB98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "71EF4F82-092F-4D19-832B-A174F7D47477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2DACA5-0AA6-419B-AC6A-8CC19326758E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4492E892-7BE5-413A-AD53-2D39BD6626F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE8A2875-0F7E-4790-A925-5999396B7578",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "90200F0F-FF1A-42D9-A4EF-8DD5F6DB6BA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "061D3731-37D1-40A9-BE2B-7C43CADC3190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B93684-6903-4A54-B631-15873D3D3744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DFDAAAC-0585-406F-B547-FB71C5352209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "916288E9-1DAB-40BE-9C29-3E8603FC0F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1573B4A5-A78B-4A17-8E1B-673A11D18221",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8FD775C-F6B6-42B3-942E-EB4DC889B5F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C42246DF-E736-4D98-AF73-3F5B731485D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC3752F8-78AB-43C9-B499-B3E2031BB29B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31AD6C5-E687-47C9-8473-2486A6864128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D8A10D-8B77-4F43-87A9-803ED9855AC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E574B02-F89A-4D5C-B462-3AF56F1C0A57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD5BEF58-456D-4983-B1CA-A53CE5C4E24E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F2B3CC-12AD-466D-98F9-0C09C7C053CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "374AD269-B0F4-4534-ABAC-D08343B2CE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5D868B-B2F8-4C25-8134-5ED8758AFB90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "828A6E23-962D-4A92-B14D-949B01489F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B676B444-6128-4A04-B3E7-421F74FA9CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF6985E0-9375-4DE2-A879-AAACF923381C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FFE8C7-6E03-45ED-A581-779C75A5C432",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D05E858C-A3D8-4BF1-A750-CFD8C949ABF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871106B-D3AF-4CFB-A544-1FA411642428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F3483B2-9EB6-4E34-900A-945C04A3160D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "611E69A3-AB62-4584-B611-93583D84FCB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r005c32:*:*:*:*:*:*:*",
              "matchCriteriaId": "29D01E86-0F60-4A99-8E48-15B0B0BF3678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r005c32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B25185C6-3F8D-4D86-84D9-4D81A3DF5632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r005c32:*:*:*:*:*:*:*",
              "matchCriteriaId": "E586B837-E86A-4B3E-8701-3C92123F9FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13F79BF-2919-45A3-9AB0-9D501DDA94B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC9042-0485-437F-811F-F8898B3B7EA7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "72ABAEF6-DC14-4C11-A570-44C23705933A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BEF9499-2D42-49A2-BBC8-54472DEEB95A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A68709FF-9E1C-4174-A925-70A88D4376A3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C38768F-F3CC-404D-9C3E-7DB9A7C4C580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
              "matchCriteriaId": "573BD5BC-48CE-4752-834D-6F6368780FB2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_iad_firmware:v300r002c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "647B85DB-2E81-4EBA-A42C-7DBEF1EDD9D3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_iad:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91C8CF3B-2907-4E9C-8CA9-6FECDDC68812",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82BCBDF-4F07-47F1-BB91-6148E2403133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC865317-D874-469D-AE84-7700B0F1485C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_usm_firmware:v100r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "BECD4671-FA6A-434E-B3A8-5141AB850661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_usm_firmware:v300r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D516A52-BA26-4841-96AC-A0718698C92A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_usm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B099CC1-0C25-46B3-B772-C61AC1657E97",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01, V300R001C00 have a weak cryptography vulnerability. Due to not properly some values in the certificates, an unauthenticated remote attacker could forges a specific RSA certificate and exploits the vulnerability to pass identity authentication and logs into the target device to obtain permissions configured for the specific user name."
    },
    {
      "lang": "es",
      "value": "Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01 y V300R001C00 tienen una vulnerabilidad de criptograf\u00eda d\u00e9bil. Debido a que no se validan correctamente algunos valores en los certificados, un atacante remoto no autenticado podr\u00eda falsificar un certificado RSA espec\u00edfico y explotar la vulnerabilidad para pasar la autenticaci\u00f3n de identidad y los registros en el dispositivo objetivo para obtener los permisos configurados para el nombre de usuario espec\u00edfico."
    }
  ],
  "id": "CVE-2017-17301",
  "lastModified": "2024-11-21T03:17:47.340",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-15T16:29:03.610",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-07-08 17:15
Modified
2024-11-21 04:34
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r007c00spc600
huawei ar510_firmware v200r007c00spc900
huawei ar510_firmware v200r007c00spcb00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei smc2.0_firmware v100r003c00spc200t
huawei smc2.0_firmware v100r003c00spc300t
huawei smc2.0_firmware v100r003c00spc301t
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00spc100
huawei smc2.0_firmware v100r005c00spc101b001t
huawei smc2.0_firmware v100r005c00spc102
huawei smc2.0_firmware v100r005c00spc103
huawei smc2.0_firmware v100r005c00spc200
huawei smc2.0_firmware v100r005c00spc201t
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v600r006c00
huawei smc2.0 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01spc500
huawei semg9811_firmware v300r001c01spc500t
huawei semg9811_firmware v300r001c01spc700
huawei semg9811_firmware v300r001c01spca00
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei softco_firmware v200r001c01spc300
huawei softco_firmware v200r001c01spc400
huawei softco_firmware v200r001c01spc500
huawei softco_firmware v200r001c01spc600
huawei softco_firmware v200r001c01sph703
huawei softco_firmware v200r003c00spc100
huawei softco_firmware v200r003c00spc200
huawei softco_firmware v200r003c00spc500
huawei softco_firmware v200r003c20
huawei softco -
huawei te30_firmware v100r001c02spc100
huawei te30_firmware v100r001c02spc200
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00spc200
huawei te30_firmware v500r002c00spc600
huawei te30_firmware v500r002c00spc700
huawei te30_firmware v500r002c00spc900
huawei te30_firmware v500r002c00spcb00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00spc600
huawei te40_firmware v500r002c00spc700
huawei te40_firmware v500r002c00spc900
huawei te40_firmware v500r002c00spcb00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00spc600
huawei te50_firmware v500r002c00spcb00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01spc100
huawei te60_firmware v100r001c10
huawei te60_firmware v100r001c10spc300
huawei te60_firmware v100r001c10spc400
huawei te60_firmware v100r001c10spc500
huawei te60_firmware v100r001c10spc600
huawei te60_firmware v100r001c10spc800
huawei te60_firmware v100r003c00
huawei te60_firmware v500r002c00
huawei te60_firmware v500r002c00spc100
huawei te60_firmware v500r002c00spc200
huawei te60_firmware v500r002c00spc300
huawei te60_firmware v500r002c00spc600
huawei te60_firmware v500r002c00spc700
huawei te60_firmware v500r002c00spc800
huawei te60_firmware v500r002c00spc900
huawei te60_firmware v500r002c00spca00
huawei te60_firmware v500r002c00spcb00
huawei te60_firmware v600r006c00
huawei te60_firmware v600r006c00spc200
huawei te60 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -
huawei usg9500_firmware v300r001c01
huawei usg9500_firmware v300r001c20
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01spc800pwe
huawei usg9520 -
huawei usg9560_firmware v300r001c20spc300
huawei usg9560 -
huawei vp9660_firmware v200r001c02spc100
huawei vp9660_firmware v200r001c02spc200
huawei vp9660_firmware v200r001c02spc300
huawei vp9660_firmware v200r001c02spc300t
huawei vp9660_firmware v200r001c02spc400
huawei vp9660_firmware v200r001c30spc100
huawei vp9660_firmware v200r001c30spc100b015t
huawei vp9660_firmware v200r001c30spc101
huawei vp9660_firmware v200r001c30spc101tb015
huawei vp9660_firmware v200r001c30spc102t
huawei vp9660_firmware v200r001c30spc103t
huawei vp9660_firmware v200r001c30spc104t
huawei vp9660_firmware v200r001c30spc200
huawei vp9660_firmware v200r001c30spc200b022t
huawei vp9660_firmware v200r001c30spc201b023t
huawei vp9660_firmware v200r001c30spc202b025t
huawei vp9660_firmware v200r001c30spc203t
huawei vp9660_firmware v200r001c30spc206t
huawei vp9660_firmware v200r001c30spc207t
huawei vp9660_firmware v200r001c30spc208t
huawei vp9660_firmware v200r001c30spc209t
huawei vp9660_firmware v200r001c30spc300
huawei vp9660_firmware v200r001c30spc400
huawei vp9660_firmware v200r001c30spc400b001
huawei vp9660_firmware v200r001c30spc400t
huawei vp9660_firmware v200r001c30spc401t
huawei vp9660_firmware v200r001c30spc402t
huawei vp9660_firmware v200r001c30spc403t
huawei vp9660_firmware v200r001c30spc404t
huawei vp9660_firmware v200r001c30spc405t
huawei vp9660_firmware v200r001c30spc600
huawei vp9660_firmware v200r001c30spc700
huawei vp9660_firmware v200r001c30spc700t
huawei vp9660_firmware v200r001c30spc701t
huawei vp9660_firmware v200r001c30spc702t
huawei vp9660_firmware v200r001c30spc703t
huawei vp9660_firmware v200r001c30spc800
huawei vp9660_firmware v200r001c30spc800t
huawei vp9660_firmware v200r001c30spc900
huawei vp9660_firmware v200r001c30spca00
huawei vp9660_firmware v200r001c30spca00t
huawei vp9660_firmware v200r001c30spca01
huawei vp9660_firmware v200r001c30spca01t
huawei vp9660_firmware v200r001c30spca02t
huawei vp9660_firmware v200r001c30spcb00
huawei vp9660_firmware v200r001c30spcc00
huawei vp9660_firmware v200r001c30spcd00
huawei vp9660_firmware v200r001c30spcd00t
huawei vp9660_firmware v200r001c30spcd01t
huawei vp9660_firmware v200r001c30spcd02t
huawei vp9660_firmware v200r001c30spcd03t
huawei vp9660_firmware v200r001c30spcd04t
huawei vp9660_firmware v200r001c30spcd05t
huawei vp9660_firmware v200r001c30spce00
huawei vp9660_firmware v200r001c30spce01t
huawei vp9660_firmware v200r001c30spcf00
huawei vp9660_firmware v200r001c30spcg00
huawei vp9660_firmware v200r001c30spch00
huawei vp9660_firmware v200r001c30spci00
huawei vp9660_firmware v200r001c30spcj00
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c00spc001t
huawei vp9660_firmware v500r002c00spc200
huawei vp9660_firmware v500r002c00spc200t
huawei vp9660_firmware v500r002c00spc201t
huawei vp9660_firmware v500r002c00spc203t
huawei vp9660_firmware v500r002c00spc204t
huawei vp9660_firmware v500r002c00spc205t
huawei vp9660_firmware v500r002c00spc206t
huawei vp9660_firmware v500r002c00spc300
huawei vp9660_firmware v500r002c00spc400
huawei vp9660_firmware v500r002c00spc500
huawei vp9660_firmware v500r002c00spc600
huawei vp9660_firmware v500r002c00spc700
huawei vp9660_firmware v500r002c00spc800
huawei vp9660_firmware v500r002c00spc900
huawei vp9660_firmware v500r002c00spc900t
huawei vp9660_firmware v500r002c00spc901t
huawei vp9660_firmware v500r002c00spca00
huawei vp9660_firmware v500r002c00spcb00
huawei vp9660_firmware v500r002c00spcb01t
huawei vp9660_firmware v500r002c00spcc00
huawei vp9660_firmware v500r002c00spcd00
huawei vp9660_firmware v500r002c00t
huawei vp9660_firmware v500r002c10
huawei vp9660_firmware v500r002c10spc100
huawei vp9660_firmware v500r002c10spc100t
huawei vp9660_firmware v500r002c10t
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03b013sp02
huawei viewpoint_8660_firmware v100r008c03b013sp03
huawei viewpoint_8660_firmware v100r008c03b013sp04
huawei viewpoint_8660_firmware v100r008c03spc100
huawei viewpoint_8660_firmware v100r008c03spc200
huawei viewpoint_8660_firmware v100r008c03spc300
huawei viewpoint_8660_firmware v100r008c03spc400
huawei viewpoint_8660_firmware v100r008c03spc500
huawei viewpoint_8660_firmware v100r008c03spc600
huawei viewpoint_8660_firmware v100r008c03spc700
huawei viewpoint_8660_firmware v100r008c03spc800
huawei viewpoint_8660_firmware v100r008c03spc900
huawei viewpoint_8660_firmware v100r008c03spca00
huawei viewpoint_8660_firmware v100r008c03spcb00
huawei viewpoint_8660_firmware v100r008c03spcc00
huawei viewpoint_8660 -
huawei viewpoint_9030_firmware v100r011c02spc100
huawei viewpoint_9030_firmware v100r011c03b012sp15
huawei viewpoint_9030_firmware v100r011c03b012sp16
huawei viewpoint_9030_firmware v100r011c03b015sp03
huawei viewpoint_9030_firmware v100r011c03lgwl01spc100
huawei viewpoint_9030_firmware v100r011c03lgwl01spc100b012
huawei viewpoint_9030_firmware v100r011c03spc100
huawei viewpoint_9030_firmware v100r011c03spc200
huawei viewpoint_9030_firmware v100r011c03spc300
huawei viewpoint_9030_firmware v100r011c03spc400
huawei viewpoint_9030_firmware v100r011c03spc500
huawei viewpoint_9030 -
huawei espace_u1910_firmware v100r001c20spc300
huawei espace_u1910_firmware v100r001c20spc400
huawei espace_u1910_firmware v100r001c20spc500
huawei espace_u1910_firmware v100r001c20spc600
huawei espace_u1910_firmware v100r001c20sph703
huawei espace_u1910_firmware v200r003c00
huawei espace_u1910_firmware v200r003c20
huawei espace_u1910_firmware v200r003c30
huawei espace_u1910 -
huawei espace_u1911_firmware v100r001c20spc300
huawei espace_u1911_firmware v100r001c20spc400
huawei espace_u1911_firmware v100r001c20spc500
huawei espace_u1911_firmware v100r001c20spc600
huawei espace_u1911_firmware v100r001c20sph309
huawei espace_u1911_firmware v100r001c20sph703
huawei espace_u1911_firmware v200r003c00
huawei espace_u1911_firmware v200r003c20
huawei espace_u1911_firmware v200r003c30
huawei espace_u1911 -
huawei espace_u1930_firmware v100r001c20spc300
huawei espace_u1930_firmware v100r001c20spc400
huawei espace_u1930_firmware v100r001c20spc500
huawei espace_u1930_firmware v100r001c20spc600
huawei espace_u1930_firmware v100r001c20sph703
huawei espace_u1930_firmware v200r003c00
huawei espace_u1930_firmware v200r003c20
huawei espace_u1930_firmware v200r003c30
huawei espace_u1930 -
huawei espace_u1960_firmware v100r001c01spc500
huawei espace_u1960_firmware v100r001c20lcrw01t
huawei espace_u1960_firmware v100r001c20spc300
huawei espace_u1960_firmware v100r001c20spc400
huawei espace_u1960_firmware v100r001c20spc600
huawei espace_u1960_firmware v100r001c20spc600t
huawei espace_u1960_firmware v100r001c20sph309
huawei espace_u1960_firmware v100r001c20sph703
huawei espace_u1960_firmware v200r003c00
huawei espace_u1960_firmware v200r003c20
huawei espace_u1960_firmware v200r003c30
huawei espace_u1960 -
huawei espace_u1980_firmware v100r001c01spc500t
huawei espace_u1980_firmware v100r001c20spc300
huawei espace_u1980_firmware v100r001c20spc400
huawei espace_u1980_firmware v100r001c20spc500t
huawei espace_u1980_firmware v100r001c20spc502
huawei espace_u1980_firmware v100r001c20spc600
huawei espace_u1980_firmware v100r001c20sph309
huawei espace_u1980_firmware v100r001c20sph703
huawei espace_u1980_firmware v200r003c00
huawei espace_u1980_firmware v200r003c20
huawei espace_u1980_firmware v200r003c30
huawei espace_u1980 -
huawei espace_u1981_firmware v100r001c20spc300
huawei espace_u1981_firmware v100r001c20spc400
huawei espace_u1981_firmware v100r001c20spc500
huawei espace_u1981_firmware v100r001c20spc600
huawei espace_u1981_firmware v100r001c20spc700
huawei espace_u1981_firmware v100r001c20sph702
huawei espace_u1981_firmware v100r001c20sph703
huawei espace_u1981_firmware v100r001c30
huawei espace_u1981_firmware v200r003c00
huawei espace_u1981_firmware v200r003c20
huawei espace_u1981_firmware v200r003c30
huawei espace_u1981 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42376C56-573F-4A88-B18E-43F636B17B41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D6C34F-ED85-461D-89AF-3B8C439867FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "D86EA007-4A57-44D9-8867-C1587E785805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A35FE7-D526-455A-934B-08D54A0302A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DBC628-F348-4204-B212-11E8E6A0AC8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B487D436-B96E-4781-AFFD-2136154F9166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CFB676-658E-4DEF-8C29-13CA633D7270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B650408-1E40-49DF-9271-6248CC1DCC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4072905-CA96-44F9-8868-BB20BDC56EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE13681-CF1A-4765-B35A-E6E674C334B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
              "matchCriteriaId": "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C526D0-9638-4BF3-823E-48F758FD3B9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD9129C5-08E9-4689-8D19-478083484A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EDCE428-7453-4259-AAD9-091F0CF1413E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8871106B-D3AF-4CFB-A544-1FA411642428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F3483B2-9EB6-4E34-900A-945C04A3160D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "94682861-8E53-408E-97F2-06A22DAC5466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A51677-9D99-491C-B524-C5ED5774AC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B55442-9A8C-4291-9086-17516814DFD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "84477B1C-413A-4F74-86DC-55E58AD07AB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "80411236-6B22-4937-87F3-E06C991B14D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A8E1096-F070-4CE9-B2B4-6368890706A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B469A91-4CD0-44D2-A982-3E612B855E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1856722C-597D-495D-AFCC-21E5FF6F2359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "728A7B78-6E19-4656-848F-269DB955070C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "946F5FF7-412F-40F9-A492-DE8E11E7B919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3D681F-E141-4BB1-9437-8BFE286CB164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D5066C9-7581-4284-AF23-0782870B2F03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "875441DD-575F-4F4D-A6BD-23C38641D330",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "51387999-E9D0-497F-A309-CA5E3126EB00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "649BB696-BDBE-46FC-A23D-287DE306D8BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD9417D-0515-4B21-AD32-E6B137575D01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC5100FF-B87F-4D3B-8B01-B9038028E436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B61BA3-EDFB-45C3-84C5-1581F6CEFF5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4145695-7ED4-4B0D-A30C-10A8183F323B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "2075745B-5A7D-47AC-8E3B-98F2AF49381B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9F838DA-3682-47DC-9058-ABAA6327885F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A94E752-CF8C-40EF-9499-309616765C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C4F484-8300-4793-AE06-EC8D8730B93C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5F6D278-95B6-4451-A252-AD870F61026C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF2AFB6B-038E-4F72-9875-7AC320ECB68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0AF0C0-46BF-4984-8378-954DF82EE227",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E57098-7E8D-4956-82E6-1474A50569C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C216CE3-3481-4F96-9D10-15B627929046",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46EE0FA6-7E53-488F-81A7-B2C906D65552",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C80D3BB-868B-461C-B97A-9C94C9F80858",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "019D2365-8BD9-4243-97CC-22264F30A24E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDD8D36D-A4F2-4423-B57E-E9933710201E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB996A1-FFCC-478B-B2EA-5BF39B5217CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC8EF14-E249-49A4-8DD5-491EB1545040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "D81D19B4-82E0-48C4-A676-9D270B529F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98F49A2-2B7C-406E-BB2F-C5431427BA33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "219AF4A5-4134-4265-BF69-C340665714F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "353AFD36-2046-4E75-96FB-CBA7071C3257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC78B8F-B4BC-429D-9685-C30B47810B32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D137236-B70C-4AC9-A041-5857FE01F293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E335D2-FE4B-4316-8827-4741EC9AA674",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F5005B-13E9-49EB-82A1-9A03F3583037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D588964F-A5F2-4D5C-AE5D-17962E599370",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3189382E-6846-4713-A92F-ABD03683F4A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3983A57-2F07-4D21-9093-1DFEAB310E26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAED7AC3-F922-44FE-B29C-ED7383FC30E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB8B3C52-C668-43D7-875D-55047B26B4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3142B435-CE92-4D8A-B34B-E81B672359DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E990766D-FBD4-404E-A783-3D2D0BC210F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE469876-F873-4705-9760-097AE840A818",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ADD081E-6FDD-49A8-84B7-B90BE9FA3B19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA573F8-92CF-463C-B445-9C8B82069C89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EA327A0-4C37-4730-A8B4-E59DB15EFF1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED834B0-65AD-4905-A9EF-06DF505BC0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F233150-6AB0-4672-B20D-9B9DD7D5158F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5E62A6-34B0-4424-B4F7-0BB55890FB5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C57141-5167-4A45-B54B-E1724F414AAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "19732856-0E1C-4A37-83C2-4FE9E0DE260A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF191AC7-EB37-46BE-85EF-642D675BFC36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB0BB461-988A-4E55-BEFC-C5BB8245E751",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA493790-6452-4EBD-ABA4-8CC2AE4523C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E71665B-85F4-4914-812E-8E763FD5E9C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EEB3DB2-810A-4FB2-BE52-9694824F90F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "509AFB31-BF50-4AAA-AD42-309C86C0A9D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E11E0F5-C34B-4745-B6F0-8DF3522FA15B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "999D02AA-1B42-4B4E-BB7B-0B063DE5F2B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E5A0D4-E459-4230-94DB-E94946425071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "018039EB-7265-4B71-B462-4734FD1D0503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3C8433-FEA5-4784-8C0A-174C677AD50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "00F48D7B-BAAB-46F8-A428-5EC68EC34EA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6D177F9-8A65-4E1F-9576-D03171336510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "38671934-B566-4A73-9C97-C0236D4EEAFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "931FD3B3-A333-4277-AE55-494F5DB9F09F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "382868EB-07B6-448B-AF15-8C66046C9422",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71366A4-11F7-42F6-A1C7-A3D3E38E0ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "5547844C-BEDD-4819-8080-832AF545E80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "826F23F7-CD43-4C33-B08A-72D34DF152BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "2630F664-C5D1-4E38-9ABC-C5EEC0E61B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7B30D7-FD50-495D-B56D-BE29C6D42831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AF9B11-C3EE-482C-AD20-7482C87EDEF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC82CFB2-6CBD-47FE-9A9F-66B3FF36EFFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13F79BF-2919-45A3-9AB0-9D501DDA94B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BC9042-0485-437F-811F-F8898B3B7EA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BD64645-CD8A-4FE3-9C28-E6001F210F3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "06047C06-B5D8-4495-A5E8-03FBC65AE2FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "D38CC7A1-D039-41BB-A795-95F5B877B9F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "18152B19-FD04-4983-B18A-0E362E8158F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "592AC67D-2210-46A4-9BB2-DA04C67E171B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FFE6C6E-BDF3-4841-9836-4C81A41F2129",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F0893C-8D47-43D7-A69B-E16F77E0F330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAA427C8-B75F-4C98-BCBF-5588409CDD18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "305174D3-15DE-4BAC-8AA6-699E487DDA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A29049D-F472-4772-8750-20730DA624E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "040454F6-FCDB-4320-8933-8F7DBB9956ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28E0627-0B19-4616-933E-76294F83813F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED506D-5094-476B-83F0-CBBED04EF348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD78C2D6-13FA-4170-898D-D836C9DAE757",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "068AC8E5-1A15-4DF3-B021-557FA491AE38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "22007E6A-68FC-4AF4-A570-95873AFBF882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D1A4CC-2F7E-40AF-8874-EE3986176623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*",
              "matchCriteriaId": "A75EB727-3F43-4C93-BB8C-A115427A10F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60030EDB-682F-4107-80FC-5F03CE75131D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F14C758-4E82-41FF-9A75-EEBD18BE8882",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C0CBDFF-95C8-4558-8B3E-FF05AF23349C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BC5336A-313C-4FBE-B849-90FB0CD5BBBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "11F2C8F2-B1E0-4916-9D0A-DAAD8F7764E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFBFBF45-CC70-4C81-81FD-944F1534FE4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B92C07-6378-4B64-B69A-8690832C1EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "803E2C56-941D-4DF0-8758-0F82D7A61689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*",
              "matchCriteriaId": "D745C321-86C5-4CB0-93E1-6368CDB76F86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*",
              "matchCriteriaId": "67AFAEF7-C9B7-46B3-B862-AD038915AEA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF11CB1A-17B3-4A74-8B36-AF3A5D4DC70B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDD1DAC8-19FE-425D-BAA6-5B391B5D6319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A014E8-0166-4005-B753-3EA5661AFFA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*",
              "matchCriteriaId": "090529B7-53B6-4385-B766-B2D338E5D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "629ACAC7-E17A-488A-9E16-AD7CEB0EB5D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C48C037-451F-4BDA-BFEA-5A35E55BB7C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DF54BC9-26E9-450A-B96F-DD016DDDE39F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBF3A771-4F45-4240-A48D-4F66776D36D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*",
              "matchCriteriaId": "8498CA51-FFF7-4B4D-A81A-F6B0D92A9264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ED036CD-01B7-4274-9DF8-5E74C7420F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*",
              "matchCriteriaId": "62030EAD-35C5-4297-96C1-253437FF4E43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B7F7B8-B6FA-49E3-B8D0-A5B0D1179503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F067CC20-CF09-4112-BB27-311C4EC27240",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF4248B-A7A6-4467-B5B8-EAEB5512A4A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E14AD0-AB2C-4408-B0B3-E9A6FB50EFFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DEB6B0-314B-4939-BB1B-2F1E6AC3E860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB9A216-C879-4029-A491-B8CF3620B189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*",
              "matchCriteriaId": "66FFB3CF-AE82-43A7-B975-CF11979F1C77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AADD9EB-E088-4909-943F-E14BAF7F28C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBE018-24D0-49BB-BB61-45A022D360BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA2EAE17-3259-4ACD-B4E0-9B6F4F6A8F9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*",
              "matchCriteriaId": "942FA7D8-8132-45EA-9BC1-3AB3EAA8806A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE6271D-5378-49A6-9684-D4FBBDFEEFF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "83293AFA-9704-446D-85BE-6BC87EC7F573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6F7386-AC2A-443B-937A-044CD0655EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*",
              "matchCriteriaId": "61F45FFD-0C26-42B6-8240-CE8F624C7C80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*",
              "matchCriteriaId": "40DA60BC-F9F1-485F-9046-D75A5AE64903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D52AE7C-DBEA-4EE1-BEBA-75DF00A4C48B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B7A5F36-EED2-426E-AC51-7658B473738B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*",
              "matchCriteriaId": "92CE161D-80AA-4BF1-BB0E-24FC9A000BFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF88F072-4426-4454-8808-E6A72FE00185",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B0B1B1-C191-473C-AC86-340079491494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB534BC-20C2-4A1D-A484-1BD24F572D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB13DBE3-C404-4237-8B98-A14A22F90D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8A9669F-4850-4ABC-BFE7-B64C1067AE08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD49670-B3BB-49FD-B9F7-28684983AC75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D003EE-7A77-44C4-9813-BC5CA22CCE8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1B34ACE-188E-40AC-A1DC-E8A8BC89026F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*",
              "matchCriteriaId": "45D728C8-E17C-47F1-8D75-B7317CAE8DF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "27AB96DA-2282-485D-BE1A-6757F04FC25F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2343EDC-0E6D-44FE-92D4-AC08DDBBFBBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*",
              "matchCriteriaId": "3451722A-E369-466C-931F-F3C2CB32E001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*",
              "matchCriteriaId": "77028912-B962-476C-9D99-DF786D436B21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*",
              "matchCriteriaId": "54A1DB67-2F87-47EE-A41F-706E56C00573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*",
              "matchCriteriaId": "1949AB01-88BC-45A8-AF50-5B8BEA260384",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC4FB395-6E38-4371-A704-82676EDFBFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "2868B5C2-332A-4AF2-8BD9-21501C107B97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*",
              "matchCriteriaId": "958470B0-1501-4395-B97F-39EB3418B129",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3F20DEB-5C88-4634-B974-57F2A37ACED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B582DA0-97AD-4D2F-AB47-58B9CEC289DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4055D38F-BD52-4EE1-9AB5-708035D6875E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*",
              "matchCriteriaId": "688C7DA4-0C61-437B-925F-4134FD2A397F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A68709FF-9E1C-4174-A925-70A88D4376A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CE6217-242E-46F5-8CE1-D22D6C7FC204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCA2F795-A63D-4694-A393-214F732B30AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E01AEA5-2389-4CE5-9ADA-9C914E4BD88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F78FDC5-9A77-4859-AD7C-9FA9E4706C36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECA09D7-18BA-4104-A31E-3D96C0C6501E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*",
              "matchCriteriaId": "63FBD4E3-5381-4325-B5B5-1071FDC28BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9040CB-120C-4534-9372-F1E66F7F3C5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D2B187-79F3-49BC-A9CF-623387207C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDBB8516-64A7-404D-996F-1016866F87FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "F657CB06-388E-497F-8628-973A1C0EDC9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "F425853E-ECFB-4867-A38F-E35BAF076C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8654BB-D300-4040-9C03-F27ADEEEDF99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC97DEE9-2280-4A83-99C6-A3B23187843C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "4626703D-6486-4999-A2CD-8040F62D2E4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "909E2AF2-DFD2-4AD7-BA16-E356A0FED753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*",
              "matchCriteriaId": "50055CE8-FDAB-4AF8-9066-9256B48F5DE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*",
              "matchCriteriaId": "0716B752-F4BA-4713-823B-88B9A627177F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0E79EC-6E0B-4641-8D1B-DBC33A87A5F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "96994AC6-FF25-4818-BECC-567654965CB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "22D857BC-8CCF-45A7-9855-06C210FDAEBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2593B2-0100-4693-A565-064AEC57B0C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5182DADD-8D18-402A-9E0A-E40FD682E4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F5DEC3-6589-46BA-AE6D-751BE679FE9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A58ED692-8BED-4877-9BC9-D41386B660C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADF4A9-4633-44CE-B5E1-84A202468C61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE8C16C7-D7B4-400A-997D-E2311188EE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*",
              "matchCriteriaId": "2563AC79-6822-47B5-81B1-7B8E0B89DFFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CCC4FFA-7667-4C15-931F-DDE0A906ECF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*",
              "matchCriteriaId": "684699EA-D32E-4E33-BAE5-95DD1125EC79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBB7D41-217D-4499-90F3-E8F196A13D54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF0069A6-C44E-4437-82C6-CB3A276DC0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "7590CB38-B8E7-41C6-A2E3-29C6B5EE044B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F3ABDFA-156D-4C26-B1B5-A443E7550E68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA5DCC1E-D02D-4AFD-B2C5-4DAF527609EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "621CCEC0-A80E-4838-B246-1F955AB35EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "1767A728-DD4D-4BEC-8177-7295DB246E03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E568A07-DD57-40AE-883E-3DE3B0CED74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C98D4F8-2BAF-42EF-BB4F-9B114DA729D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "034865C2-C8A1-4FB9-BDE8-7B05C9B47F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F467A7FC-B0F2-454C-825F-A9A685F8F9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*",
              "matchCriteriaId": "527370A7-4361-43D7-9B0C-1EC3658436A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8124C805-982B-422C-BCEB-BEEC1B6A883B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEABC547-7345-4DEB-99DB-5EDAB2C8B7DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E40DF15-0B29-42BD-88EC-7F5A19796690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*",
              "matchCriteriaId": "1271BFB9-7655-44D8-BF5C-AAEB5B191C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*",
              "matchCriteriaId": "18627C53-7136-434E-AAAC-0E91714597EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C3544AA-D3C3-4B79-B102-AF8C8DB8FDB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9C00440-F202-43C2-9FE1-D7B1B46BA0F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CF1DB39-2C29-4102-A824-2ABA83A9D3FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F37C402-C5B8-44D9-9C46-2E8CA5601F7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "9159B699-1785-4B78-81E7-0B2C06914663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE20FF5-BCFC-4875-9D8F-D629CFE23F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA6963D-FD64-41E7-854E-E8A1D1933BE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7413DAC-3D06-4BF9-86F6-AB252F544B6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "2121E3CD-830D-4AB5-85CD-518F847A1365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "A637C741-ADD4-47CF-AF0C-1BEC88FD3491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7DA000-8759-4891-AA86-AD5C8198C942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B429F2A-F96F-48F2-9338-2352A7A591C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F279F7E4-0792-49EF-8350-6BCEAC47EC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "092A87B2-9DDC-4E0E-8E24-ABEF302237C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5B8443A-558E-4A88-8C2D-9864698B1861",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D34B75B-37AD-4BDB-8443-2488A1724A36",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "94041F48-9513-46D7-BC87-C6C3BFAA7CCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E934A38-A846-4E8E-B363-504F28B16084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FCCB0C7-5936-4080-9C81-636F6C2F54DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8D8CAA4-B4B1-4D84-B7EE-7F5AF90E1A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
              "matchCriteriaId": "6384012E-37D8-4F16-9AA9-2A4EBFA5C10B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E8A40C-20BE-4338-BBE8-0DC20FCF7104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E69FE58-F3E4-4EB7-BC93-8473A92349B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAB4306-2BED-4D72-B749-0560F43343B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "623B6384-EC71-433F-B847-9C3EBB6245BD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71DCB864-FE1B-4807-9E33-A704BFBAA7F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CC1FF3E-A3F2-4D3C-A78F-B54110CEAA37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "C312637E-2B50-4D63-9927-02020BFE8CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "70E3A131-B5C2-48B8-AD39-37A4902E2EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "046FD7A6-B680-4E05-AA82-E8EAA26706D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF13E364-E24E-40DD-AE5E-218A22B243EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "0097488A-1187-44CD-BF82-1ADAF2B8FF78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "314A8BD9-6E5C-427D-AF90-957CAA63509B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E3707B5-2AE7-4A9C-8E55-3E86AB6B9CE1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EAD666B-4533-4A31-BADC-2D7469407BC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "B441A998-B9B8-43C1-8EBE-30198327E062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*",
              "matchCriteriaId": "26B056FD-D248-4DD3-8297-CC1C5FF13B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF78641C-2ABF-4C88-AE2B-11E8A1647E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "314BD69C-5F1C-417D-8ACC-A4E84F78C9EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "18900675-4095-448A-AD52-4DA0772B303E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB400E10-3747-4855-811E-3A14209FBC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B7C50D1-F0C2-40B4-B9C2-10E9D0DD7A6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42D667-EC04-4129-8A0E-EF1546A84B96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "922BCDDA-FAAE-4720-857F-E168C9AF2B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4CA9B1-9650-4F3B-A0F3-52238CE58719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0A48568-D28E-459B-86D3-0BF350D0168C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "253A9E39-A256-461D-BFD5-F9B6629089D0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*",
              "matchCriteriaId": "994839C2-DE0D-4FFD-8660-D24FCDE9099F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C71CFF2-3A4B-4931-B457-C5D849EA0A74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B12FE8-3D35-413E-AC7A-866F1A81455C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*",
              "matchCriteriaId": "C77AF8B9-54EE-4AF0-B9AB-2468070EDC8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C59007-3FB7-49A2-8ABD-8A9FE7F2005B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "170B98F3-FDD2-41E4-96B2-E1B15FAC60E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ACE6398-CDE1-4F39-8F79-54804A27514F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "39C668B1-088F-4E5F-A380-2AD1C117EBA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4A08F66-354F-4B91-AD0B-F7680202F00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "72E59FD0-FA4F-4C38-9B3F-557FD7097DF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "20683E6D-7C66-4240-B322-372DF2D3B4E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6EB7F3-F04C-4838-A866-3417850FED65",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A95CA09-88DF-4EA4-920F-3CC7574A8FCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA3018C-C09D-4C46-8566-7D8C98B244B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C568BC9-B999-4C14-B898-9EFEC0DC761D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA498493-3508-4C38-8591-D9F1EC045578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB552A67-C220-4E5F-94DA-1ACEEEE59F51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*",
              "matchCriteriaId": "311CA367-C6E5-4982-B06A-45329E0CF428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CEA6B95-5836-44FC-954F-C7B726844449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DFCB81-F308-4EEC-AD5D-5225D025C167",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82BCBDF-4F07-47F1-BB91-6148E2403133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC865317-D874-469D-AE84-7700B0F1485C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo SIP de algunos productos Huawei presenta una vulnerabilidad de denegaci\u00f3n de servicio (DoS). Un atacante remoto podr\u00eda explotar estas tres vulnerabilidades mediante el env\u00edo de los mensajes especialmente dise\u00f1ados hacia el dispositivo afectado. Debido a la verificaci\u00f3n insuficiente de los paquetes, una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar desbordamiento del b\u00fafer y un bucle muerto, conllevando a una condici\u00f3n DoS. Los productos afectados pueden ser encontrados en https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
    }
  ],
  "id": "CVE-2019-19415",
  "lastModified": "2024-11-21T04:34:43.987",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-08T17:15:09.513",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        },
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-04-01 02:00
Modified
2024-11-21 02:28
Severity ?
Summary
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
References
cve@mitre.orghttp://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034Third Party Advisory
cve@mitre.orghttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705Third Party Advisory
cve@mitre.orghttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=143456209711959&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=143629696317098&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=143741441012338&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=143741441012338&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=143817021313142&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=143817021313142&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=143817899717054&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=143817899717054&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=143818140118771&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=143818140118771&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=144043644216842&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=144059660127919&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=144059703728085&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=144060576831314&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=144060606031437&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=144069189622016&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=144102017024820&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=144104533800819&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=144104565600964&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=144493176821532&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=144493176821532&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1006.htmlThird Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1007.htmlThird Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1020.htmlThird Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1021.htmlThird Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1091.htmlThird Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1228.htmlThird Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1229.htmlThird Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1230.htmlThird Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1241.htmlThird Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1242.htmlThird Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1243.htmlThird Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-1526.htmlThird Party Advisory
cve@mitre.orghttp://www-01.ibm.com/support/docview.wss?uid=swg1IV71888Third Party Advisory
cve@mitre.orghttp://www-01.ibm.com/support/docview.wss?uid=swg1IV71892Third Party Advisory
cve@mitre.orghttp://www-01.ibm.com/support/docview.wss?uid=swg21883640Third Party Advisory
cve@mitre.orghttp://www-304.ibm.com/support/docview.wss?uid=swg21903565Third Party Advisory
cve@mitre.orghttp://www-304.ibm.com/support/docview.wss?uid=swg21960015Third Party Advisory
cve@mitre.orghttp://www-304.ibm.com/support/docview.wss?uid=swg21960769Third Party Advisory
cve@mitre.orghttp://www.debian.org/security/2015/dsa-3316Third Party Advisory
cve@mitre.orghttp://www.debian.org/security/2015/dsa-3339Third Party Advisory
cve@mitre.orghttp://www.huawei.com/en/psirt/security-advisories/hw-454055Third Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlThird Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlPatch, Third Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlThird Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlThird Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlThird Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/73684Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/91787Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1032599Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1032600Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1032707Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1032708Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1032734Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1032788Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1032858Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1032868Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1032910Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1032990Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1033071Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1033072Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1033386Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1033415Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1033431Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1033432Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1033737Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1033769Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1036222Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2696-1Third Party Advisory
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2706-1Third Party Advisory
cve@mitre.orghttp://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htmThird Party Advisory
cve@mitre.orghttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922Third Party Advisory
cve@mitre.orghttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140Third Party Advisory
cve@mitre.orghttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190Third Party Advisory
cve@mitre.orghttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119Third Party Advisory
cve@mitre.orghttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241Third Party Advisory
cve@mitre.orghttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256Third Party Advisory
cve@mitre.orghttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246Third Party Advisory
cve@mitre.orghttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789Third Party Advisory
cve@mitre.orghttps://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650Third Party Advisory
cve@mitre.orghttps://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380Third Party Advisory
cve@mitre.orghttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988Third Party Advisory
cve@mitre.orghttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347Third Party Advisory
cve@mitre.orghttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935Third Party Advisory
cve@mitre.orghttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888Third Party Advisory
cve@mitre.orghttps://kb.juniper.net/JSA10783Third Party Advisory
cve@mitre.orghttps://kc.mcafee.com/corporate/index?page=content&id=SB10163Broken Link
cve@mitre.orghttps://security.gentoo.org/glsa/201512-10Third Party Advisory
cve@mitre.orghttps://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709Third Party Advisory
cve@mitre.orghttps://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdfTechnical Description, Third Party Advisory
cve@mitre.orghttps://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
af854a3a-2127-422b-91ae-364da2661108http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143456209711959&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143629696317098&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143741441012338&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143741441012338&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143817021313142&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143817021313142&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143817899717054&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143817899717054&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143818140118771&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143818140118771&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=144043644216842&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=144059660127919&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=144059703728085&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=144060576831314&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=144060606031437&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=144069189622016&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=144102017024820&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=144104533800819&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=144104565600964&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=144493176821532&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=144493176821532&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1006.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1007.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1020.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1021.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1091.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1228.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1229.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1230.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1241.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1242.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1243.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1526.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21883640Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-304.ibm.com/support/docview.wss?uid=swg21903565Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-304.ibm.com/support/docview.wss?uid=swg21960015Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-304.ibm.com/support/docview.wss?uid=swg21960769Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3316Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3339Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.huawei.com/en/psirt/security-advisories/hw-454055Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/73684Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/91787Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032599Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032600Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032707Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032708Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032734Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032788Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032858Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032868Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032910Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032990Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1033071Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1033072Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1033386Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1033415Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1033431Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1033432Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1033737Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1033769Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1036222Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2696-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2706-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htmThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://kb.juniper.net/JSA10783Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://kc.mcafee.com/corporate/index?page=content&id=SB10163Broken Link
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201512-10Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdfTechnical Description, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
Impacted products
Vendor Product Version
oracle communications_application_session_controller *
oracle communications_policy_management *
oracle http_server 11.1.1.7.0
oracle http_server 11.1.1.9.0
oracle http_server 12.1.3.0.0
oracle http_server 12.2.1.1.0
oracle http_server 12.2.1.2.0
oracle integrated_lights_out_manager_firmware *
oracle integrated_lights_out_manager_firmware *
debian debian_linux 7.0
debian debian_linux 8.0
redhat satellite 5.7
redhat enterprise_linux_desktop 5.0
redhat enterprise_linux_desktop 6.0
redhat enterprise_linux_desktop 7.0
redhat enterprise_linux_eus 6.6
redhat enterprise_linux_eus 7.1
redhat enterprise_linux_eus 7.2
redhat enterprise_linux_eus 7.3
redhat enterprise_linux_eus 7.4
redhat enterprise_linux_eus 7.5
redhat enterprise_linux_eus 7.6
redhat enterprise_linux_eus 7.7
redhat enterprise_linux_server 5.0
redhat enterprise_linux_server 6.0
redhat enterprise_linux_server 7.0
redhat enterprise_linux_server_aus 6.6
redhat enterprise_linux_server_aus 7.3
redhat enterprise_linux_server_aus 7.4
redhat enterprise_linux_server_aus 7.6
redhat enterprise_linux_server_aus 7.7
redhat enterprise_linux_server_tus 7.3
redhat enterprise_linux_server_tus 7.6
redhat enterprise_linux_server_tus 7.7
redhat enterprise_linux_workstation 5.0
redhat enterprise_linux_workstation 6.0
redhat enterprise_linux_workstation 7.0
suse linux_enterprise_debuginfo 11
suse linux_enterprise_debuginfo 11
opensuse opensuse 13.1
opensuse opensuse 13.2
suse linux_enterprise_desktop 11
suse linux_enterprise_desktop 11
suse linux_enterprise_desktop 12
suse linux_enterprise_server 10
suse linux_enterprise_server 11
suse linux_enterprise_server 11
suse linux_enterprise_server 11
suse linux_enterprise_server 12
suse linux_enterprise_software_development_kit 11
suse linux_enterprise_software_development_kit 12
suse manager 1.7
suse linux_enterprise_server 11
canonical ubuntu_linux 12.04
canonical ubuntu_linux 14.04
canonical ubuntu_linux 15.04
redhat satellite 5.6
redhat enterprise_linux 5.0
redhat enterprise_linux 6.0
fujitsu sparc_enterprise_m3000_firmware *
fujitsu sparc_enterprise_m3000 -
fujitsu sparc_enterprise_m4000_firmware *
fujitsu sparc_enterprise_m4000 -
fujitsu sparc_enterprise_m5000_firmware *
fujitsu sparc_enterprise_m5000 -
fujitsu sparc_enterprise_m8000_firmware *
fujitsu sparc_enterprise_m8000 -
fujitsu sparc_enterprise_m9000_firmware *
fujitsu sparc_enterprise_m9000 -
huawei e6000_firmware -
huawei e6000 -
huawei e9000_firmware -
huawei e9000 -
huawei oceanstor_18500_firmware -
huawei oceanstor_18500 -
huawei oceanstor_18800_firmware -
huawei oceanstor_18800 -
huawei oceanstor_18800f_firmware -
huawei oceanstor_18800f -
huawei oceanstor_9000_firmware -
huawei oceanstor_9000 -
huawei oceanstor_cse_firmware -
huawei oceanstor_cse -
huawei oceanstor_hvs85t_firmware -
huawei oceanstor_hvs85t -
huawei oceanstor_s2600t_firmware -
huawei oceanstor_s2600t -
huawei oceanstor_s5500t_firmware -
huawei oceanstor_s5500t -
huawei oceanstor_s5600t_firmware -
huawei oceanstor_s5600t -
huawei oceanstor_s5800t_firmware -
huawei oceanstor_s5800t -
huawei oceanstor_s6800t_firmware -
huawei oceanstor_s6800t -
huawei oceanstor_vis6600t_firmware -
huawei oceanstor_vis6600t -
huawei quidway_s9300_firmware -
huawei quidway_s9300 -
huawei s7700_firmware -
huawei s7700 -
huawei s7700_firmware -
huawei s7700 -
huawei 9700_firmware -
huawei 9700 -
huawei 9700_firmware -
huawei 9700 -
huawei s12700_firmware -
huawei s12700 -
huawei s12700_firmware -
huawei s12700 -
huawei s2700_firmware -
huawei s2700 -
huawei s3700_firmware -
huawei s3700 -
huawei s5700ei_firmware -
huawei s5700ei -
huawei s5700hi_firmware -
huawei s5700hi -
huawei s5700si_firmware -
huawei s5700si -
huawei s5710ei_firmware -
huawei s5710ei -
huawei s5710hi_firmware -
huawei s5710hi -
huawei s6700_firmware -
huawei s6700 -
huawei s2750_firmware -
huawei s2750 -
huawei s5700li_firmware -
huawei s5700li -
huawei s5700s-li_firmware -
huawei s5700s-li -
huawei s5720hi_firmware -
huawei s5720hi -
huawei s2750_firmware -
huawei s2750 -
huawei s5700li_firmware -
huawei s5700li -
huawei s5700s-li_firmware -
huawei s5700s-li -
huawei s5720hi_firmware -
huawei s5720hi -
huawei s5720ei_firmware -
huawei s5720ei -
huawei te60_firmware -
huawei te60 -
huawei oceanstor_replicationdirector v100r003c00
huawei policy_center v100r003c00
huawei policy_center v100r003c10
huawei smc2.0 v100r002c01
huawei smc2.0 v100r002c02
huawei smc2.0 v100r002c03
huawei smc2.0 v100r002c04
huawei ultravr v100r003c00
ibm cognos_metrics_manager 10.1
ibm cognos_metrics_manager 10.1.1
ibm cognos_metrics_manager 10.2
ibm cognos_metrics_manager 10.2.1
ibm cognos_metrics_manager 10.2.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C306035B-10B2-4BC5-B6DE-194BE343DA8E",
              "versionEndIncluding": "3.9.0",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3AB62FE-AB1A-4162-8A51-E34EDE33DD85",
              "versionEndExcluding": "9.9.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "911FBD5E-213D-482F-81A9-C3B8CE7D903A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD2676F-EE9D-4462-ABA5-C11CE726849C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6505AE29-5091-4C72-AF6B-932DEF53A8D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EC475C1-A339-4C49-B6BA-A0E4D6FDF5DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "38A45A86-3B7E-4245-B717-2A6E868BE6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24EDBB8B-1AFB-498D-B78C-7BC72B8C1085",
              "versionEndIncluding": "3.2.11",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3024389-3D4A-4E19-BE42-DAF9EA51D471",
              "versionEndIncluding": "4.0.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EA16E0-9261-45C4-840F-5366E9EAC5E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "319EC0C6-94C5-494A-9C5D-DC5124DFC8E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A67A7B7A-998D-4B8C-8831-6E58406565FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE1D81A1-CD24-4B17-8AFD-DC95E90AD7D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "58D3B6FD-B474-4B09-B644-A8634A629280",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "F892F1B0-514C-42F7-90AE-12ACDFDC1033",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "17D4B6F2-514D-4BC2-B2C5-4E2FCCAC594C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
              "matchCriteriaId": "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
              "matchCriteriaId": "35BBD83D-BDC7-4678-BE94-639F59281139",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*",
              "matchCriteriaId": "67960FB9-13D1-4DEE-8158-31BF31BCBE6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*",
              "matchCriteriaId": "CB6476C7-03F2-4939-AB85-69AA524516D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
              "matchCriteriaId": "2470C6E8-2024-4CF5-9982-CFF50E88EAE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
              "matchCriteriaId": "15FC9014-BD85-4382-9D04-C0703E901D7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
              "matchCriteriaId": "1831D45A-EE6E-4220-8F8C-248B69520948",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:suse:manager:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9E2D37-9F56-49E0-BB28-56FB755CE078",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
              "matchCriteriaId": "88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4840254-CC76-4113-BC61-360BD15582B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DBE3B60-DED8-4F47-A60F-410ECB873BAE",
              "versionEndExcluding": "xcp_1121",
              "versionStartIncluding": "xcp",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB54B753-F066-4387-B0C3-43E647A42EBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BBD38A2-1B17-4B28-9FE1-6D62A6337C12",
              "versionEndExcluding": "xcp_1121",
              "versionStartIncluding": "xcp",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m4000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1846C0CA-AE13-435F-BF91-EEE0CC311DD5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5884F45B-F822-46B9-A0DC-6B59A3C3E7E0",
              "versionEndExcluding": "xcp_1121",
              "versionStartIncluding": "xcp",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2EDCD99-9677-45A7-9221-3A6A41917A7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ED7A13F-9510-4FA0-96A6-D2D34D49545F",
              "versionEndExcluding": "xcp_1121",
              "versionStartIncluding": "xcp",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m8000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9581ABD4-5ED6-4EC5-8A0B-1D7A449C10D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m9000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C4C1EC1-19BE-4E1E-8F56-47A83AD0410D",
              "versionEndExcluding": "xcp_1121",
              "versionStartIncluding": "xcp",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m9000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A2CEAD6-9F8C-411C-9107-BA858CB8A31B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:e6000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "075D228F-B3F3-44A0-9C93-510E2EF7BE16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:e6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F66D29E-0B7F-45D3-BECC-21952F4A4850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:e9000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA0AE74D-A6FC-44A1-80D4-CB5039FD31AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:e9000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "741F1B4C-D77D-416F-B6D9-0359F391D96F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_18500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "929D8B7A-4535-49EA-9DD6-AB83174337AA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_18500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7AAE27E-EB13-43E2-A7F4-7973977AD936",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_18800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E00020C-C1FB-425B-B285-BCF7450F76B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_18800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B196FDFF-8A1D-4E7D-895A-1D09ADACC396",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_18800f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47CA0343-7F2A-45BE-B7A2-8F91F31C0912",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_18800f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E675B6C-C847-486F-8946-F98E271E1DC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_9000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45D279CD-1344-4200-B4DF-303739323D19",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_9000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEC54023-CF84-4095-A3E8-2D6E334768E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_cse_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5F81B5-BD6E-4B10-8EB9-AE0929E3DCE6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_cse:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E9846D2-4A8C-421E-8FE0-F6091DD2B30E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2453CC3-FDD3-4C42-9D17-C231DA2D1F41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_hvs85t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "675CCB4F-BB76-45DC-9E6E-3BD279995084",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_s2600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBD74E7B-DB83-44DF-9A0B-D2EFF346855A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_s2600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FFC0113-86D7-45B1-975F-B24AF1951C4A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_s5500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E3E931B-BD89-48D1-BE5F-0BDBF78914C0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_s5500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F36770F0-2E40-42FF-BD7B-7AE2C84E62A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_s5600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63E1D8ED-A4EC-46B4-A0C0-8F46262F1D2F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_s5600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6830C365-357D-41A3-8AA7-3B4854260762",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_s5800t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A307235-4B7B-40EE-807A-9C8FFD8DF72C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_s5800t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "866A8777-DB2A-4915-8DA6-1AF751742354",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_s6800t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "488319BB-6D39-4AA5-85A8-840EF46227F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_s6800t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F50E5B-8733-43AB-B6CF-66AC7305E2DB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_vis6600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC3C090-EB04-4A0D-8644-51002CF2ABF5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_vis6600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0988C3-BAE5-4B5A-92FC-9D275B4DE9F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:quidway_s9300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F01C05D-6937-4FAD-A0E1-6168EE1D7CE4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E756FE8-F106-4BFD-B33B-CC198363D2FD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF102265-497A-4766-80C8-323D511B4EAF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF102265-497A-4766-80C8-323D511B4EAF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A3C463F-2C0B-4269-95ED-A578C01E0F55",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2A9F6EB-8B6E-465C-B441-C4861771861E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A3C463F-2C0B-4269-95ED-A578C01E0F55",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2A9F6EB-8B6E-465C-B441-C4861771861E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89D69269-4251-4CE9-AD67-4968A917C1E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "138C1E57-176C-46B1-9704-D9C8391CC802",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89D69269-4251-4CE9-AD67-4968A917C1E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "138C1E57-176C-46B1-9704-D9C8391CC802",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s2700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "540F0482-7F5E-4688-B282-97A6576E0A6D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2CD071-58E4-4061-8217-990453213470",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s3700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A2B2D-99B1-4AA5-BB39-65D58D8B59B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7F84390-E120-406B-967D-B473EB110EA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD39BD-0D24-4C1E-969C-C9509AE8A0D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0BE6C3-1FB2-4718-AA9D-1A8D8663C195",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "409A4E21-B8D8-445F-A9C4-3CDA73189CA9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED775342-B93C-4DF9-BC62-B6BE549F1B29",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700si_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31FB20E5-4830-411C-AE4B-6B2E180C0972",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700si:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24C4DC87-DE8C-461F-A555-F6E9A71C1C48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5710ei_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E7ABCB-D0C0-4C18-A7AC-8C1EBD5E4E87",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5710ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D59F3D-CC4A-4ADD-B83C-5CE3F0546622",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "065508F6-D026-4C99-B6F9-AE25CB1124D3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5710hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DFF0F26-CDF2-49B0-AED7-EEA4B9E99E8C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s6700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E35CBD-4488-4E64-BEA2-A2E89A4BB9E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA7AC10D-B0DD-4206-8642-134DDD585C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0C6E3C4-5677-49B6-9D35-FAC2E550F311",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7859972-B7B8-4619-AAED-22B6B14852BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1755FB01-C830-4147-B0BF-7D422A7D2181",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B89917-2B3D-4BA5-8836-ADEECF46E976",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DF808C1-3081-4FC7-8661-FBF6A04761B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700s-li:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86FFC3BE-77A0-4202-9AE0-06D8D67F6539",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A960DA7-8B35-43B3-B15F-F3F7E14BF308",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB64BC36-693E-4101-9C13-4A4C572A4EDE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0C6E3C4-5677-49B6-9D35-FAC2E550F311",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7859972-B7B8-4619-AAED-22B6B14852BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1755FB01-C830-4147-B0BF-7D422A7D2181",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B89917-2B3D-4BA5-8836-ADEECF46E976",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DF808C1-3081-4FC7-8661-FBF6A04761B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700s-li:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86FFC3BE-77A0-4202-9AE0-06D8D67F6539",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A960DA7-8B35-43B3-B15F-F3F7E14BF308",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB64BC36-693E-4101-9C13-4A4C572A4EDE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5720ei_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A799E13-49E1-4CFB-BB7D-5E528C7E0FE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5720ei:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7B06975-BD37-452D-9782-B768610D3777",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:te60_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D65BF93A-9246-48CB-8510-F6B0380F48D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:huawei:oceanstor_replicationdirector:v100r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0D7527-BCA2-4CF5-A793-1C01F6570679",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:policy_center:v100r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "95CA0A4C-2571-4593-A075-9A6A7EABBB33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:policy_center:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D46E9E-7F34-49C4-B56F-9090157FAD6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v100r002c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D6E37DD-6CEA-443A-80C2-79E28C78D7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v100r002c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE1A9027-21FC-45E0-98B2-BFB8B5BE484D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v100r002c03:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8620BB-7730-4C8F-8B4B-21389636B3C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v100r002c04:*:*:*:*:*:*:*",
              "matchCriteriaId": "D971D78C-A6F3-438D-A292-54A9A226FFE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:ultravr:v100r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "648D923E-BF31-4DF4-B160-66874A8E45AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:cognos_metrics_manager:10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "23F3243D-14BB-45F4-BBF6-DD45B8729B6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:cognos_metrics_manager:10.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "97449883-5401-42C0-8FF1-6A5BEC7BC829",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:cognos_metrics_manager:10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2DDB90-C6A1-4EE5-96F2-F0A33B2F79A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:cognos_metrics_manager:10.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E43C2590-059B-43BE-BFD1-7B0D1020D324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:cognos_metrics_manager:10.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "379CF92E-AFD1-4744-AC07-6A495548F121",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the \"Bar Mitzvah\" issue."
    },
    {
      "lang": "es",
      "value": "El algoritmo RC4, utilizado en el protocolo TLS y el protocolo SSL, no combina correctamente los datos de estados con los datos de claves durante la fase de inicializaci\u00f3n, lo que facilita a atacantes remotos realizar ataques de recuperaci\u00f3n de texto claro contra los bytes iniciales de un flujo mediante la captura de trafico de la red que ocasionalmente depende de claves afectadas por la debilidad de la invariabilidad (Invariance Weakness), y posteriormente utilizar un acercamiento de fuerza bruta que involucra valores LSB, tambi\u00e9n conocido como el problema de \u0027Bar Mitzvah\u0027."
    }
  ],
  "id": "CVE-2015-2808",
  "lastModified": "2024-11-21T02:28:07.190",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-04-01T02:00:35.097",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10727"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143456209711959\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143629696317098\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144043644216842\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144059660127919\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144059703728085\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144060576831314\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144060606031437\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144069189622016\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144102017024820\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144104533800819\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144104565600964\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1228.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1229.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1230.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1243.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1526.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960015"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2015/dsa-3316"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2015/dsa-3339"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/hw-454055"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/73684"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/91787"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032599"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032600"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032707"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032708"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032734"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032788"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032858"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032868"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032910"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032990"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033071"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033072"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033386"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033415"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033431"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033432"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033737"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033769"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1036222"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2696-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2706-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://kb.juniper.net/JSA10783"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201512-10"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10727"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143456209711959\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143629696317098\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144043644216842\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144059660127919\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144059703728085\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144060576831314\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144060606031437\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144069189622016\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144102017024820\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144104533800819\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144104565600964\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1228.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1229.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1230.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1243.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1526.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960015"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2015/dsa-3316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2015/dsa-3339"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/hw-454055"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/73684"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/91787"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032599"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032600"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032707"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032708"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032734"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032788"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032858"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032868"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032910"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032990"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033072"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033386"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033432"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033737"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033769"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1036222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2696-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2706-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://kb.juniper.net/JSA10783"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201512-10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:33
Summary
AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v600r006c00
huawei smc2.0 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD9E894-321E-4A61-9DA6-677042DDD739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA91B4-77A6-4A37-8799-5E548184D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "42376C56-573F-4A88-B18E-43F636B17B41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE416CD-53B5-4E08-BB30-682887740C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D6C34F-ED85-461D-89AF-3B8C439867FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4459EF03-890E-446E-8702-8F7CE499FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C623D44E-463B-49A3-81F8-AD219E035B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125153E-FE39-49A7-95AA-9482C78E7114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "455D7A4E-523E-40C8-958D-59D128F3E797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B64AE02-D345-4628-A086-7C63C255707C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "526371A8-11FE-4D00-AFBB-8E867A320B27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "787AC5E3-CE88-491D-8211-BAB11112019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "868602DB-D063-4BE4-A02B-936433CD8231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A35FE7-D526-455A-934B-08D54A0302A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A72083-717F-4C71-A2D7-62E1C64FEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CCEC64-BD07-49F7-8804-98A74257F060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A685289C-08B1-43D4-9970-84A7FC75E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DBC628-F348-4204-B212-11E8E6A0AC8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A007D-A498-483F-8B4F-DCA118B25F11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "622686BB-9302-449F-9351-75B189D1B184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5186D104-FD41-4F54-9923-25B0C8C09E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B95EB-A848-4311-8500-9C909784393E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B487D436-B96E-4781-AFFD-2136154F9166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F042B27-F875-4BA3-9002-E5ADC544208B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F377CE1E-77A7-447F-B692-A54682A26BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CCF46F-1B0F-4829-BB28-758777313451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50662078-4827-4706-AE29-170E2239C5AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32119825-AF22-44AA-8D04-1FAACF9E2E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897F931-00B2-4FDF-90CE-5077416E42BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9752658E-3CF5-4D9E-98FB-D15FD892479C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0595B3AA-8911-44AF-996B-2F431517FBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A842B77-C902-4B20-A171-3F98C75E6160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01969DE-DC37-4F2F-BB9B-5242810A8317",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4072905-CA96-44F9-8868-BB20BDC56EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE13681-CF1A-4765-B35A-E6E674C334B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C579A9-2768-4202-9171-BC803554E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD9E893-609B-4C97-82E6-0651AEC39D14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7A0E2C-8383-443D-8625-77CBC53D2140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "51387999-E9D0-497F-A309-CA5E3126EB00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6224ECC-6949-4204-94D1-C7374C142A50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "611E69A3-AB62-4584-B611-93583D84FCB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B319F31F-94D7-468F-8F71-96F40867AEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0AF0C0-46BF-4984-8378-954DF82EE227",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497D97B-F044-4F9A-84B0-378978FBDC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E57098-7E8D-4956-82E6-1474A50569C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43681AE7-5C12-4772-85A9-0A10177C6CFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash."
    },
    {
      "lang": "es",
      "value": "AR120-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR1200 con software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR1200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR150 con software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR150-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR160 con software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR200 con software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30; AR200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR2200 con software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR2200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR3200 con software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30; AR510 con software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30; NetEngine16EX con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; SMC2.0 con software V100R003C10, V100R005C00, V500R002C00, V600R006C00; SRG1300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; SRG2300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; y SRG3300 con software V200R006C10, V200R007C00, V200R008C20, V200R008C30 tienen una vulnerabilidad de lectura fuera de l\u00edmites. A causa de una validaci\u00f3n de entradas insuficiente, un atacante remoto autenticado podr\u00eda enviar un mensaje especialmente manipulado al dispositivo objetivo. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar una lectura fuera de l\u00edmites y el cierre inesperado del sistema."
    }
  ],
  "id": "CVE-2017-8163",
  "lastModified": "2024-11-21T03:33:26.833",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-11-22T19:29:03.803",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-06 02:15
Modified
2024-11-21 05:49
Summary
There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:huawei:imaster_mae-m:v100r020c10spc220:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F67A4BC-9424-458A-A24B-2AFF301329C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F14B3716-7A94-42C5-AE2C-9F64C15A43EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.0:rc2.b050:*:*:*:*:*:*",
              "matchCriteriaId": "E514234B-1DB4-4170-BC73-510058ED5788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.0:spc100.b210:*:*:*:*:*:*",
              "matchCriteriaId": "1F587216-1355-4DD6-83E2-27CCE4ACC2E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "CAE8F0E3-8BCA-4059-9BE1-A7BDFD18531A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc1.b060:*:*:*:*:*:*",
              "matchCriteriaId": "24872541-A493-48BD-AA2C-7A976FF75F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b020:*:*:*:*:*:*",
              "matchCriteriaId": "61EC963F-1160-43D4-B4E4-2CC2B209B4DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b030:*:*:*:*:*:*",
              "matchCriteriaId": "2B7820BE-0307-40F3-A7BD-66D5B8C7A0A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b040:*:*:*:*:*:*",
              "matchCriteriaId": "AD086E38-D1F5-4160-A7A2-12E681F686CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b050:*:*:*:*:*:*",
              "matchCriteriaId": "035E4DF1-4B17-448B-8A78-CD81F68D38CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b060:*:*:*:*:*:*",
              "matchCriteriaId": "DDDB5BDF-9760-4EE6-947D-A633B9CC0D36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b070:*:*:*:*:*:*",
              "matchCriteriaId": "31787857-76F6-4E80-82B7-56B1C12B6628",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b080:*:*:*:*:*:*",
              "matchCriteriaId": "3495FF32-2906-4064-A636-64EB3A06421D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b090:*:*:*:*:*:*",
              "matchCriteriaId": "73901E08-8C24-46FB-A42D-6457630AA6DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc100.b050:*:*:*:*:*:*",
              "matchCriteriaId": "A472E9AA-784F-4AE2-B1D8-6C77EA1664B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc101.b010:*:*:*:*:*:*",
              "matchCriteriaId": "F7CC07B4-FBF6-4AC9-8C54-B7845A068BBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc101.b040:*:*:*:*:*:*",
              "matchCriteriaId": "36904A81-9DCD-4E65-ADC1-A5A96FA0D939",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200:*:*:*:*:*:*",
              "matchCriteriaId": "481FA740-3E71-443D-99DF-89CA198951A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b010:*:*:*:*:*:*",
              "matchCriteriaId": "37636652-DC9E-4310-AB33-1C67B85A7BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b030:*:*:*:*:*:*",
              "matchCriteriaId": "C462984C-407A-4D52-BEDD-7E300482E2AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b040:*:*:*:*:*:*",
              "matchCriteriaId": "154A70F1-C15A-41B1-97B8-89550595BF44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b050:*:*:*:*:*:*",
              "matchCriteriaId": "B58D9F18-F7B5-4514-978D-EC419614F521",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b060:*:*:*:*:*:*",
              "matchCriteriaId": "BD51B07E-213B-4D32-A121-E2FD124EA1A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b070:*:*:*:*:*:*",
              "matchCriteriaId": "7926B343-242E-414B-B573-84DB16A2FCBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1.1:b010:*:*:*:*:*:*",
              "matchCriteriaId": "463A4059-55EF-4862-B8AD-90DCAC0CC871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1.1:b020:*:*:*:*:*:*",
              "matchCriteriaId": "4042FC49-4FC7-46B4-8D14-ECACF22A9860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1.1:b030:*:*:*:*:*:*",
              "matchCriteriaId": "A4D8799F-9ADD-442F-BC39-4BCAFBFFBE2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1.1:b040:*:*:*:*:*:*",
              "matchCriteriaId": "535597A4-29C8-44A8-9008-4F4E10030531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "EFA5EBB8-C174-4CF0-ADE6-15B62C10DD86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:lcnd81:*:*:*:*:*:*",
              "matchCriteriaId": "E9090F1E-EF60-4E54-9885-7F6B1681DE9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "51E51969-9D4D-4A58-BEBD-19F4BD64BC7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "2A1E9FF8-C0A4-47A5-9738-4D0ADB35DAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:rc3.b041:*:*:*:*:*:*",
              "matchCriteriaId": "1B552573-DB7A-4454-A832-AE1811A9577C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:rc3.spc100:*:*:*:*:*:*",
              "matchCriteriaId": "5D17BA55-6032-4BC4-BEB3-4FB27BA81777",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:spc100:*:*:*:*:*:*",
              "matchCriteriaId": "7EDE7C94-7E89-45E6-8A79-32E53D9139DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A8E919-FAC0-4011-927F-599AA7688A32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:network_functions_virtualization_fusionsphere:6.5.1:spc12:*:*:*:*:*:*",
              "matchCriteriaId": "BD187FC7-B1BE-4BF1-BB6E-AA05CEFE4910",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:network_functions_virtualization_fusionsphere:6.5.1:spc23:*:*:*:*:*:*",
              "matchCriteriaId": "1FBB7636-4E6E-4621-9F42-9CDC8EB472F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r019c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2DC0656-EE97-43AF-9499-7ED8E31D6458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r019c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C32980F5-E091-4B2F-A8D3-F30367C8B9C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad de escalada de privilegios local en algunos productos Huawei. Un atacante autentificado local podr\u00eda dise\u00f1ar comandos espec\u00edficos para explotar esta vulnerabilidad. Una explotaci\u00f3n con \u00e9xito puede hacer que un atacante obtenga un mayor privilegio. Las versiones de producto afectadas incluyen:  ManageOne versiones 6.5.0, 6.5.0.SPC100.B210, 6.5.1.1.B010, 6.5.1.1.B020, 6.5.1.1.B030, 6.5.1.1.B040, 6.5.1.SPC100.B050, 6.5.1.SPC101.B010, 6.5.1.SPC101.B040, 6.5.1.SPC200, 6.5.1.SPC200.B010, 6.5.1.SPC200.B030, 6.5.1.SPC200.B040, 6.5.1 .SPC200.B050, 6.5.1.SPC200.B060, 6.5.1.SPC200.B070, 6.5.1RC1.B060, 6.5.1RC2.B020, 6.5.1RC2.B030, 6.5.1RC2.B040, 6.5.1RC2.B050, 6.5.1RC2.B060, 6.5.1RC2.B070, 6.5.1RC2.B080, 6.5.1RC2.B090, 6.5.RC2.B050, 8.0.0, 8.0.0-LCND81, 8.0.0.SPC100, 8.0.1, 8.0.RC2, 8.0.RC3, 8.0.RC3.B041, 8.0.RC3.SPC100;\u0026#xa0;NFV_FusionSphere versiones 6.5.1.SPC23, 8.0.0.SPC12; SMC2.0 versiones V600R019C00,\u0026#xa0;V600R019C10;\u0026#xa0;iMaster MAE-M versiones MAE-TOOL (FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220"
    }
  ],
  "id": "CVE-2021-22299",
  "lastModified": "2024-11-21T05:49:52.027",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-06T02:15:12.680",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-05-16 19:29
Modified
2025-02-07 17:15
Summary
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
References
secure@microsoft.comhttp://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.htmlExploit, Third Party Advisory, VDB Entry
secure@microsoft.comhttp://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.htmlExploit, Third Party Advisory, VDB Entry
secure@microsoft.comhttp://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.htmlExploit, Third Party Advisory, VDB Entry
secure@microsoft.comhttp://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.htmlThird Party Advisory, VDB Entry
secure@microsoft.comhttp://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.htmlExploit, Third Party Advisory, VDB Entry
secure@microsoft.comhttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-enThird Party Advisory
secure@microsoft.comhttp://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-enThird Party Advisory
secure@microsoft.comhttps://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdfThird Party Advisory
secure@microsoft.comhttps://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdfThird Party Advisory
secure@microsoft.comhttps://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdfThird Party Advisory
secure@microsoft.comhttps://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdfThird Party Advisory
secure@microsoft.comhttps://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdfThird Party Advisory
secure@microsoft.comhttps://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdfThird Party Advisory
secure@microsoft.comhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-enThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-enThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708Patch, Vendor Advisory
Impacted products
Vendor Product Version
microsoft windows_7 -
microsoft windows_server_2008 -
microsoft windows_server_2008 r2
siemens axiom_multix_m_firmware *
siemens axiom_multix_m -
siemens axiom_vertix_md_trauma_firmware *
siemens axiom_vertix_md_trauma -
siemens axiom_vertix_solitaire_m_firmware *
siemens axiom_vertix_solitaire_m -
siemens mobilett_xp_digital_firmware *
siemens mobilett_xp_digital -
siemens multix_pro_acss_p_firmware *
siemens multix_pro_acss_p -
siemens multix_pro_p_firmware *
siemens multix_pro_p -
siemens multix_pro_firmware *
siemens multix_pro -
siemens multix_pro_acss_firmware *
siemens multix_pro_acss -
siemens multix_pro_navy_firmware *
siemens multix_pro_navy -
siemens multix_swing_firmware *
siemens multix_swing -
siemens multix_top_firmware *
siemens multix_top -
siemens multix_top_acss_firmware *
siemens multix_top_acss -
siemens multix_top_p_firmware *
siemens multix_top_p -
siemens multix_top_acss_p_firmware *
siemens multix_top_acss_p -
siemens vertix_solitaire_firmware *
siemens vertix_solitaire -
siemens atellica_solution_firmware *
siemens atellica_solution -
siemens aptio_firmware *
siemens aptio -
siemens streamlab_firmware *
siemens streamlab -
siemens centralink_firmware *
siemens centralink -
siemens viva_e_firmware *
siemens viva_e -
siemens viva_twin_firmware *
siemens viva_twin -
siemens syngo_lab_process_manager *
siemens rapidpoint_500_firmware *
siemens rapidpoint_500 -
siemens lantis_firmware *
siemens lantis -
huawei agile_controller-campus_firmware v100r002c00
huawei agile_controller-campus_firmware v100r002c10
huawei agile_controller-campus -
huawei bh620_v2_firmware v100r002c00
huawei bh620_v2 -
huawei bh621_v2_firmware v100r002c00
huawei bh621_v2 -
huawei bh622_v2_firmware v100r001c00
huawei bh622_v2 -
huawei bh640_v2_firmware v100r002c00
huawei bh640_v2 -
huawei ch121_firmware v100r001c00
huawei ch121 -
huawei ch140_firmware v100r001c00
huawei ch140 -
huawei ch220_firmware v100r001c00
huawei ch220 -
huawei ch221_firmware v100r001c00
huawei ch221 -
huawei ch222_firmware v100r002c00
huawei ch222 -
huawei ch240_firmware v100r001c00
huawei ch240 -
huawei ch242_firmware v100r001c00
huawei ch242 -
huawei ch242_v3_firmware v100r001c00
huawei ch242_v3 -
huawei e6000_firmware v100r002c00
huawei e6000 -
huawei e6000_chassis_firmware v100r001c00
huawei e6000_chassis -
huawei gtsoftx3000_firmware v200r001c01spc100
huawei gtsoftx3000_firmware v200r002c00spc300
huawei gtsoftx3000_firmware v200r002c10spc100
huawei gtsoftx3000 -
huawei oceanstor_18500_firmware v100r001c30spc300
huawei oceanstor_18500 -
huawei oceanstor_18800_firmware v100r001c30spc300
huawei oceanstor_18800 -
huawei oceanstor_18800f_firmware v100r001c30spc300
huawei oceanstor_18800f -
huawei oceanstor_hvs85t_firmware v100r001c00
huawei oceanstor_hvs85t_firmware v100r001c30spc200
huawei oceanstor_hvs85t -
huawei oceanstor_hvs88t_firmware v100r001c00
huawei oceanstor_hvs88t_firmware v100r001c30spc200
huawei oceanstor_hvs88t -
huawei rh1288_v2_firmware v100r002c00
huawei rh1288_v2 -
huawei rh1288a_v2_firmware v100r002c00
huawei rh1288a_v2 -
huawei rh2265_v2_firmware v100r002c00
huawei rh2265_v2 -
huawei rh2268_v2_firmware v100r002c00
huawei rh2268_v2 -
huawei rh2285_v2_firmware v100r002c00
huawei rh2285_v2 -
huawei rh2285h_v2_firmware v100r002c00
huawei rh2285h_v2 -
huawei rh2288_v2_firmware v100r002c00
huawei rh2288_v2 -
huawei rh2288a_v2_firmware v100r002c00
huawei rh2288a_v2 -
huawei rh2288e_v2_firmware v100r002c00
huawei rh2288e_v2 -
huawei rh2288h_v2_firmware v100r002c00
huawei rh2288h_v2 -
huawei rh2485_v2_firmware v100r002c00
huawei rh2485_v2 -
huawei rh5885_v2_firmware v100r001c00
huawei rh5885_v2 -
huawei rh5885_v3_firmware v100r003c00
huawei rh5885_v3 -
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v600r006c00
huawei smc2.0 -
huawei seco_vsm_firmware v200r002c00
huawei seco_vsm -
huawei uma_firmware v200r001c00
huawei uma_firmware v300r001c00
huawei uma -
huawei x6000_firmware v100r002c00
huawei x6000 -
huawei x8000_firmware v100r002c20
huawei x8000 -
huawei elog_firmware v200r003c10
huawei elog -
huawei espace_ecs_firmware v300r001c00
huawei espace_ecs -



{
  "cisaActionDue": "2022-05-03",
  "cisaExploitAdd": "2021-11-03",
  "cisaRequiredAction": "Apply updates per vendor instructions.",
  "cisaVulnerabilityName": "Microsoft Remote Desktop Services Remote Code Execution Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:axiom_multix_m_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EB36445-3462-4398-84F9-1387A7436FC7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:axiom_multix_m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66829DE2-25D6-4FF5-B1AA-6637AE053ACE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:axiom_vertix_md_trauma_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "733840A0-5D17-4D92-BB45-357E39CC9190",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:axiom_vertix_md_trauma:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FAFB504-D8F4-4589-9D25-616CB38BF257",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:axiom_vertix_solitaire_m_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B1B857-3051-4312-A997-99570D567D74",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:axiom_vertix_solitaire_m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86974C5C-C4A4-4109-B5DC-85D4F01E94D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:mobilett_xp_digital_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7392294B-487E-4B31-B6A5-560C4F547338",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:mobilett_xp_digital:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC524FD4-B53D-4E22-A9A9-33EB73811CF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:multix_pro_acss_p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB111CF-1760-45FE-A005-68965EEB9034",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:multix_pro_acss_p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46335917-7477-47B9-9D03-079D0AFD6121",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:multix_pro_p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "72E96638-0DE1-4370-B0FC-8E418BD74C71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:multix_pro_p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9E130C-EB9B-46F2-A67A-1CB22F67E3CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:multix_pro_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FE644ED-DFE9-4F11-9C8B-E5EA6CF6BA1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:multix_pro:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C221669-D976-4C2B-8634-2FB0583F27A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:multix_pro_acss_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AA78BA8-8443-441D-B629-5F5652296566",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:multix_pro_acss:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F39B002A-3FCC-4F73-8BEA-575BD000C49F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:multix_pro_navy_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2B6D8DF-5F9B-469E-B8F1-D59021B5D1A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:multix_pro_navy:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "284692FE-2298-43F8-B59E-F86BA2453146",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:multix_swing_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAD4D073-FA45-4D28-BF69-0A706C61BA32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:multix_swing:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69644600-D356-45A7-9E8B-91458255C252",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:multix_top_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AFC6443-6826-4C1F-95D7-621EA0C5B547",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:multix_top:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29DFEA58-1949-41EF-AF8A-A01E2BD64ABE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:multix_top_acss_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E0BDAE-DA78-439B-8368-E861BAB682EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:multix_top_acss:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68111C12-7DD9-4DB3-AC80-B95A5A063A09",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:multix_top_p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B92FD292-31EB-448B-BD86-8D14A758A254",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:multix_top_p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "161AD776-6029-43EA-BDDA-FC8357699C33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:multix_top_acss_p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE3A3B2B-D371-49D4-B7C1-A00595282EC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:multix_top_acss_p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "610660AA-0AA6-434E-B824-80AE565570B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:vertix_solitaire_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1282797-1448-4B11-825F-49863AD4BDC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:vertix_solitaire:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A4A8BC9-0249-45EB-91D7-1B57491F4951",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:atellica_solution_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E9780A-0015-4245-9CAE-D7573D8C4268",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:atellica_solution:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B264A65-9109-4629-8F20-1DD6728FAD7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:aptio_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "502E501A-78A0-4074-BC7D-7BAFE4386337",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:aptio:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D8C9706-43E8-48E5-913C-FE0FDEEB489F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:streamlab_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "195AD327-F323-4902-9CDB-4C7C1B3D1F3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:streamlab:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD03E0CF-4707-4C95-8703-264429D52996",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:centralink_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D56D3C8-5731-4EE2-B79B-BB74163E3D62",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:centralink:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "500986D3-3A08-46C4-9482-88CFA6ED61B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:viva_e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2405D2-7048-4541-9526-AA2B88D2A38B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:viva_e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "745742F2-A291-470B-8EB1-482A23873737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:viva_twin_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D64A2198-C839-43A8-BFEB-D575B372DD7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:viva_twin:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA780EE3-B6AB-4393-9997-D09CBB433C51",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:siemens:syngo_lab_process_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B232D046-AD22-445F-8EE0-EED30BCA9DAD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:rapidpoint_500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFF1E341-5481-494A-BAFF-E080E39C9DA7",
              "versionEndIncluding": "2.3.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:rapidpoint_500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A4806F5-0292-45BA-96B9-422958D0CB0F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:lantis_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B8CA8D2-1BA4-4B58-969D-DBA7F72DA755",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:lantis:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06FF378C-EAAD-4808-9246-010AC0A17E90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:agile_controller-campus_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6B574A3-5FCD-4F3E-932D-10334180F4F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:agile_controller-campus_firmware:v100r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "81635D07-BFBF-4485-B4CF-9C05620DB447",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:agile_controller-campus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "592559FB-7551-4327-9ECE-9325F4173C85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:bh620_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAAA4664-EB38-4693-88AD-F226D7A07C93",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:bh620_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D21222-A1F6-4312-B833-6576F75820C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:bh621_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC40CC46-D679-42F8-B2C2-FF3EDA28BCF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:bh621_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D61715-5074-41EC-A50F-5C347D85266F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:bh622_v2_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "617A06EA-67C0-4714-B8D8-2602E0E34029",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:bh622_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E191F04-E8BE-4D73-89D0-42C2DB288C4D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:bh640_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "93792886-51EE-4172-ACED-F195F0556A98",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:bh640_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFBB2CA0-7556-42E8-B7C7-57F1C6477CFF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ch121_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "668E5527-0E2F-40CD-8857-B720A6C9B802",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ch121:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA223DE5-F37C-4451-96A9-9DFA479591AB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ch140_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D7D565C-DC70-4978-BF91-79DD99FA347C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ch140:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB768F1-FA54-4043-B538-31783D941CC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ch220_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7D7D307-43F7-43AD-AA2E-F0DB66F7F9D1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ch220:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED03ED73-8B5C-4369-8F3A-68497718B488",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ch221_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "685452C8-9B87-4FBC-9E27-0DF5F2B44807",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ch221:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "211005F7-2DAA-40EC-9B92-D2E866052E84",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ch222_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E41FE7C8-77B4-4EC7-83C3-F587BDC8A18D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ch222:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21FB1E88-3CB4-48FE-9F52-AA12D40DB944",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ch240_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC1DD2F-DE32-4EA6-9539-792FCBDEF20D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ch240:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74027C23-3637-4ABE-A697-B20FD7B94162",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ch242_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6185FD57-FE4F-43E2-A3EA-3AA5A299A05D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ch242:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE8DA951-047B-4A88-A851-9663F2EC2CEB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ch242_v3_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "563AC0A9-568C-4010-9142-28C88349B587",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ch242_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2637E43-1937-4320-AAF4-3770C332B66E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:e6000_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "774E8CD3-3E77-41EB-ABC9-CE885CC90FA9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:e6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F66D29E-0B7F-45D3-BECC-21952F4A4850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:e6000_chassis_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3057065D-9D25-4BE2-8392-48405063E821",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:e6000_chassis:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "748D3A0F-12FA-4755-969B-45D7B3D55147",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r001c01spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C6D34F-BFE4-420C-B496-E4D82783ED7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r002c00spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F646FC2-3A77-4971-BACC-D0CA7B9379DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r002c10spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98EEDBC-42C6-4896-83A5-8EE175F4710C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:gtsoftx3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C5827F-092C-4A94-A907-F653A55C280D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_18500_firmware:v100r001c30spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "22D7738B-B2B1-423C-A7C6-A73280F085C7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_18500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7AAE27E-EB13-43E2-A7F4-7973977AD936",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_18800_firmware:v100r001c30spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B908D26-6C4F-4955-A284-39C4C338AEBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_18800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B196FDFF-8A1D-4E7D-895A-1D09ADACC396",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_18800f_firmware:v100r001c30spc300:*:*:*:*:*:*:*",
              "matchCriteriaId": "C46963C2-0175-4933-A2A1-4CFBA3FF4586",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_18800f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E675B6C-C847-486F-8946-F98E271E1DC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6188E188-7CA7-4415-835D-738A684B7639",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:v100r001c30spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "981C1A1D-352D-478A-BF04-F1D9A71C86D6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_hvs85t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "675CCB4F-BB76-45DC-9E6E-3BD279995084",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_hvs88t_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9A7C688-25E6-457B-AFBF-657EDE621FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:oceanstor_hvs88t_firmware:v100r001c30spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EBFCDE-7FB8-4CA7-9A2E-F94DD572B48B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:oceanstor_hvs88t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C3C47BF-7FAA-4A6C-BBDC-CC8D28CCA611",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rh1288_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AA159F6-CE6C-4EC9-9166-718780F752CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rh1288_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F24DF092-9867-4381-BDFB-5AB7116DEFD4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rh1288a_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE3450A4-4C1A-4125-8B18-3961D69D6F0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rh1288a_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7E91ACB-82D0-4A4E-9157-5142A26E577A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rh2265_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "485D4E2A-7697-40CD-92E4-0B93CB898DD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rh2265_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3860458-155E-47F6-A37E-730DE7A363DE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rh2268_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E293DFF-1C3F-4180-895D-E7BC4A14FB93",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rh2268_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6C2FB1E-2569-4AB9-95A2-DCD4AC8C7D1D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rh2285_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C57B46-9085-458A-8A5B-A6F74E00F4D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rh2285_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38DF8C15-4086-4F70-BCD2-BDB91900C80A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rh2285h_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "449982CF-3F17-473D-9B58-3E1076B1CF1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rh2285h_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "275A2FCA-8E0A-4EFA-907B-4F6E3E954372",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rh2288_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "377CAD92-7563-43D9-92A3-C05B149F65E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rh2288_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E1F1478-2D24-42D5-8401-3D6BAB20A7F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rh2288a_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A522BFBE-69E6-4DF8-83D3-27564AF88C6B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rh2288a_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3CB6AA6-2424-41B2-92A7-81E788DB8396",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rh2288e_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE64C9F3-EEEF-44CB-8C3B-0969D2A76C81",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rh2288e_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A446D94-F39F-461D-B935-02C87058D0AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rh2288h_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "56D5E59C-5824-463B-8121-57E3689DD1C0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rh2288h_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "908E0834-8E5D-43EF-A604-AAFCA6E69767",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rh2485_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AFBF820-E15D-4E7F-AD44-D4AE5EF208FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rh2485_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D2E8A9D-7BC5-40D2-B85B-61D753A4D88B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rh5885_v2_firmware:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "525FAA8B-734F-4B0D-8E32-9066CF9D939F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rh5885_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C7EEF7-1AF2-41D8-98A6-0237524B76C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:rh5885_v3_firmware:v100r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "779C3401-3A97-4DFE-AD0B-E8B2A48AA04A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:rh5885_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C3BAFB9-A7C7-4199-89B2-587D650762C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:seco_vsm_firmware:v200r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A756B3A-BD91-4857-869B-AF435E66BAD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:seco_vsm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7EBA07-D6A7-4C45-8C57-84E2549A4CFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:uma_firmware:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "207D80F3-6DB4-4BDE-AE72-38BAF4EE2B67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:uma_firmware:v300r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "429F7534-D2A9-4275-9333-0786F315037E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:uma:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1940680-0927-4E56-83E3-3525797978B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:x6000_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF613F6D-DBC7-4A35-9A8D-B948FB3C84F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:x6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24BB4E74-B9A6-4C2C-AB61-A4028CDFF614",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:x8000_firmware:v100r002c20:*:*:*:*:*:*:*",
              "matchCriteriaId": "48CBF1C9-1DA3-4B3C-AB00-42F41248B074",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:x8000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CCB6E7-0BF2-4762-BDD6-0F68B087CBF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:elog_firmware:v200r003c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A696C2-836C-441C-875D-9D68F2DE25B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:elog:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C34C1766-B15E-4C73-AE28-F22D9296DF20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:espace_ecs_firmware:v300r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "95140BB8-911D-4F19-8C6E-DCD6FA2298AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:espace_ecs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A924CA6B-C4BB-4340-BF27-B0EE4B72F9A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Remote Desktop Services Remote Code Execution Vulnerability\u0027."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Remote Desktop Services, anteriormente conocido como Terminal Services, cuando un atacante no autenticado se conecta al sistema de destino mediante RDP y env\u00eda peticiones especialmente dise\u00f1adas, conocida como \u0027Remote Desktop Services Remote Code Execution Vulnerability\u0027."
    }
  ],
  "id": "CVE-2019-0708",
  "lastModified": "2025-02-07T17:15:15.520",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2019-05-16T19:29:00.427",
  "references": [
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708"
    }
  ],
  "sourceIdentifier": "secure@microsoft.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-06-29 19:15
Modified
2024-11-21 05:49
Summary
There is a multiple threads race condition vulnerability in Huawei product. A race condition exists for concurrent I/O read by multiple threads. An attacker with the root permission can exploit this vulnerability by performing some operations. Successful exploitation of this vulnerability may cause the system to crash. Affected product versions include: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2.0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931
Impacted products
Vendor Product Version
huawei manageone 6.5.1
huawei manageone 8.0.0
huawei manageone 8.0.0
huawei manageone 8.0.0
huawei manageone 8.0.0
huawei manageone 8.0.0
huawei manageone 8.0.0
huawei manageone 8.0.1
huawei smc2.0 v600r019c10spc700
huawei smc2.0 v600r019c10spc702
huawei smc2.0 v600r019c10spc703
huawei smc2.0 v600r019c10spc800
huawei smc2.0 v600r019c10spc900
huawei smc2.0 v600r019c10spc910
huawei smc2.0 v600r019c10spc920
huawei smc2.0 v600r019c10spc921
huawei smc2.0 v600r019c10spc922
huawei smc2.0 v600r019c10spc930
huawei smc2.0 v600r019c10spc931



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200:*:*:*:*:*:*",
              "matchCriteriaId": "481FA740-3E71-443D-99DF-89CA198951A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "EFA5EBB8-C174-4CF0-ADE6-15B62C10DD86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:lcnd81:*:*:*:*:*:*",
              "matchCriteriaId": "E9090F1E-EF60-4E54-9885-7F6B1681DE9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "51E51969-9D4D-4A58-BEBD-19F4BD64BC7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "2A1E9FF8-C0A4-47A5-9738-4D0ADB35DAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:rc3.spc100:*:*:*:*:*:*",
              "matchCriteriaId": "5D17BA55-6032-4BC4-BEB3-4FB27BA81777",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:spc100:*:*:*:*:*:*",
              "matchCriteriaId": "7EDE7C94-7E89-45E6-8A79-32E53D9139DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:manageone:8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A8E919-FAC0-4011-927F-599AA7688A32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v600r019c10spc700:*:*:*:*:*:*:*",
              "matchCriteriaId": "7963F54D-82E2-49B4-A897-0D403265A5E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v600r019c10spc702:*:*:*:*:*:*:*",
              "matchCriteriaId": "11188CC9-6AF5-4D12-8698-A29003B93894",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v600r019c10spc703:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39C9F23-B8A4-461B-AA1B-D74D4250B3C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v600r019c10spc800:*:*:*:*:*:*:*",
              "matchCriteriaId": "A80AA28A-E243-49B0-BC89-EC71C0FD391A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v600r019c10spc900:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD9AFCB-49CC-451A-8384-4FC5209CBED0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v600r019c10spc910:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B96A81A-7CFC-4E47-8D23-8298E300C632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v600r019c10spc920:*:*:*:*:*:*:*",
              "matchCriteriaId": "87F80ABC-A650-4FBC-B099-FA5022AEE80F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v600r019c10spc921:*:*:*:*:*:*:*",
              "matchCriteriaId": "33211E67-DCE2-4763-A318-0901F6CE7D9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v600r019c10spc922:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAEF1712-F605-43D2-9765-2F13D3FDE6E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v600r019c10spc930:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB259BD-CCCD-409D-885B-57FFFA33D3CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:huawei:smc2.0:v600r019c10spc931:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8CFA5B-18D7-44A9-BE52-78B4AB8B1D45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is a multiple threads race condition vulnerability in Huawei product. A race condition exists for concurrent I/O read by multiple threads. An attacker with the root permission can exploit this vulnerability by performing some operations. Successful exploitation of this vulnerability may cause the system to crash. Affected product versions include: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2.0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931"
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad de condici\u00f3n de carrera de m\u00faltiples hilos en el producto de Huawei. Se presenta una condici\u00f3n de carrera para la lectura concurrente de I/O por m\u00faltiples hilos. Un atacante con el permiso de root puede explotar esta vulnerabilidad al llevar a cabo algunas operaciones. Una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad puede causar el bloqueo del sistema. Las versiones del producto afectadas incluyen: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2. 0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931"
    }
  ],
  "id": "CVE-2021-22340",
  "lastModified": "2024-11-21T05:49:56.537",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 4.7,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-29T19:15:09.180",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

var-202102-0639
Vulnerability from variot

There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220. plural Huawei The product contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Several Huawei products have a security vulnerability, which stems from the application not properly imposing security restrictions, resulting in bypassing security restrictions and privilege escalation. The following devices or models have this vulnerability: manageone 8.0.rc3.spc100, manageone 8.0.rc3.b041, manageone 8.0.rc3, manageone 8.0.0.spc100, manageone 8.0.0-lcnd81, manageone 6.5.1rc2.b030, manageone 6.5 .1rc2.b020, manageone 6.5.1rc1.b060, manageone 6.5.0.spc100.b210, manageone 8.0.rc2, manageone 6.5.1rc2.b090, manageone 6.5.1rc2.b080, manageone 6.5.1rc2.b070, manageone 6.5. 1rc2.b060, manageone 6.5.1rc2.b050, manageone 6.5.1rc2.b040, manageone 6.5.1.spc200.b070, manageone 6.5.1.spc200.b060, manageone 6.5.1.spc200.b050, manageone 6.5.1. spc200.b040, manageone 6.5.1.spc200.b030, manageone 6.5.1.spc200.b010, manageone 6.5.1.spc200, manageone 6.5.1.spc101.b040, manageone 6.5.1.spc101.b010, manageone 6.5. 1.spc100.b050, manageone 8.0.1, manageone 8.0.0, manageone 6.5.1.1.b040, manageone 6.5.1.1.b030, manageone 6.5.1.1.b020, manageone 6.5.1.1.b010, manageone 6.5.rc2

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0639",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "imaster mae-m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r020c10spc220"
      },
      {
        "model": "manageone",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.1"
      },
      {
        "model": "network functions virtualization fusionsphere",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "6.5.1"
      },
      {
        "model": "manageone",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "6.5.1.1"
      },
      {
        "model": "manageone",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "6.5.1"
      },
      {
        "model": "manageone",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0"
      },
      {
        "model": "manageone",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "6.5.0"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c10"
      },
      {
        "model": "imaster mae-m",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "manageone",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nfv fusionsphere",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003367"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22299"
      }
    ]
  },
  "cve": "CVE-2021-22299",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-22299",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-380734",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2021-22299",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2021-22299",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-22299",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-22299",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202101-1629",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-380734",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380734"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-1629"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22299"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220. plural Huawei The product contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Several Huawei products have a security vulnerability, which stems from the application not properly imposing security restrictions, resulting in bypassing security restrictions and privilege escalation. The following devices or models have this vulnerability: manageone 8.0.rc3.spc100, manageone 8.0.rc3.b041, manageone 8.0.rc3, manageone 8.0.0.spc100, manageone 8.0.0-lcnd81, manageone 6.5.1rc2.b030, manageone 6.5 .1rc2.b020, manageone 6.5.1rc1.b060, manageone 6.5.0.spc100.b210, manageone 8.0.rc2, manageone 6.5.1rc2.b090, manageone 6.5.1rc2.b080, manageone 6.5.1rc2.b070, manageone 6.5. 1rc2.b060, manageone 6.5.1rc2.b050, manageone 6.5.1rc2.b040, manageone 6.5.1.spc200.b070, manageone 6.5.1.spc200.b060, manageone 6.5.1.spc200.b050, manageone 6.5.1. spc200.b040, manageone 6.5.1.spc200.b030, manageone 6.5.1.spc200.b010, manageone 6.5.1.spc200, manageone 6.5.1.spc101.b040, manageone 6.5.1.spc101.b010, manageone 6.5. 1.spc100.b050, manageone 8.0.1, manageone 8.0.0, manageone 6.5.1.1.b040, manageone 6.5.1.1.b030, manageone 6.5.1.1.b020, manageone 6.5.1.1.b010, manageone 6.5.rc2",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-22299"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003367"
      },
      {
        "db": "VULHUB",
        "id": "VHN-380734"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22299"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-22299",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003367",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-1629",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-380734",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22299",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380734"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22299"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-1629"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22299"
      }
    ]
  },
  "id": "VAR-202102-0639",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380734"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T22:54:54.816000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20210120-02-privilege",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en"
      },
      {
        "title": "Huawei Various product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139879"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-1629"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003367"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22299"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22299"
      },
      {
        "trust": 0.6,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20210120-02-privilege-cn"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/195350"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380734"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22299"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-1629"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22299"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-380734"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22299"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-1629"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22299"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-02-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-380734"
      },
      {
        "date": "2021-02-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-22299"
      },
      {
        "date": "2021-10-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-003367"
      },
      {
        "date": "2021-01-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202101-1629"
      },
      {
        "date": "2021-02-06T02:15:12.680000",
        "db": "NVD",
        "id": "CVE-2021-22299"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-07-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-380734"
      },
      {
        "date": "2021-02-11T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-22299"
      },
      {
        "date": "2021-10-25T08:30:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-003367"
      },
      {
        "date": "2022-07-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202101-1629"
      },
      {
        "date": "2024-11-21T05:49:52.027000",
        "db": "NVD",
        "id": "CVE-2021-22299"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-1629"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0Huawei\u00a0 Product permission management vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003367"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-1629"
      }
    ],
    "trust": 0.6
  }
}

var-201711-1007
Vulnerability from variot

AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The AR series, SRG series, and NetEngine16EX service routing gateways are Huawei's all-in-one integrated service gateways for small and medium-sized branches and small and medium-sized enterprises. Huawei SMC2.0 is a video service management platform. A denial of service vulnerability exists in several Huawei products because the device failed to properly handle malformed messages. Huawei AR120-S and others are all router products of China Huawei (Huawei). The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR150 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR150-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR160 V200R006C10 Version, V200R006C12 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR200 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R008C20 Version, V200R008C30 Version; AR200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR2200

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201711-1007",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r006c11"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r008c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r008c10"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16pwe"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c17"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c15"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar120-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r006c12",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c16pwe",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c11",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c12",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c15",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c16",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c17",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34448"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010623"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-969"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8162"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:ar120-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar1200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar1200-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar150_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar150-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar160_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar200-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar2200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar2200-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar3200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar510_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:netengine16ex_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:smc2.0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:srg1300_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:srg2300_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:srg3300_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010623"
      }
    ]
  },
  "cve": "CVE-2017-8162",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "CVE-2017-8162",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2017-34448",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "VHN-116365",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.8,
            "id": "CVE-2017-8162",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-8162",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-8162",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-34448",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201711-969",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-116365",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34448"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116365"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010623"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-969"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8162"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The AR series, SRG series, and NetEngine16EX service routing gateways are Huawei\u0027s all-in-one integrated service gateways for small and medium-sized branches and small and medium-sized enterprises. Huawei SMC2.0 is a video service management platform. A denial of service vulnerability exists in several Huawei products because the device failed to properly handle malformed messages. Huawei AR120-S and others are all router products of China Huawei (Huawei). The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR150 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR150-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR160 V200R006C10 Version, V200R006C12 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR200 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R008C20 Version, V200R008C30 Version; AR200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR2200",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-8162"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010623"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34448"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116365"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-8162",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010623",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-969",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34448",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-116365",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34448"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116365"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010623"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-969"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8162"
      }
    ]
  },
  "id": "VAR-201711-1007",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34448"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116365"
      }
    ],
    "trust": 1.6831511146153844
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34448"
      }
    ]
  },
  "last_update_date": "2024-11-23T23:02:19.117000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20171018-01-h323",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
      },
      {
        "title": "Patches for various Huawei Product Denial of Service Vulnerabilities (CNVD-2017-34448)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/106349"
      },
      {
        "title": "Multiple Huawei Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76679"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34448"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010623"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-969"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-116365"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010623"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8162"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8162"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-8162"
      },
      {
        "trust": 0.6,
        "url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171018-01-h323-cn"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34448"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116365"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010623"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-969"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8162"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34448"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116365"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010623"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-969"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8162"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-34448"
      },
      {
        "date": "2017-11-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116365"
      },
      {
        "date": "2017-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010623"
      },
      {
        "date": "2017-11-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-969"
      },
      {
        "date": "2017-11-22T19:29:03.773000",
        "db": "NVD",
        "id": "CVE-2017-8162"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-34448"
      },
      {
        "date": "2017-12-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116365"
      },
      {
        "date": "2017-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010623"
      },
      {
        "date": "2017-11-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-969"
      },
      {
        "date": "2024-11-21T03:33:26.677000",
        "db": "NVD",
        "id": "CVE-2017-8162"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-969"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Product buffer error vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010623"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-969"
      }
    ],
    "trust": 0.6
  }
}

var-201802-0545
Vulnerability from variot

Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device. plural Huawei The product contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei AR and SRG series enterprise routers are Huawei's all-in-one routers for small and medium-sized offices or small and medium-sized enterprises. Huawei's SVN series products are Huawei's secure access gateway products; NIP6300/6600 series products and SecospaceUSG series. Huawei is a new generation of professional intrusion prevention and firewall products for customers such as enterprises, IDCs, campus networks and operators. The TE series is a high definition video conferencing terminal that supports 1080p60. The vulnerability was caused by the program failing to fully verify the message. Huawei AR120-S and others are all routers of China Huawei (Huawei). H323 protocol is one of the audio and video protocols. The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version , V200R007C00, V200R008C20, V200R008C30; AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30-S; AR15

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0545",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc200"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c02"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc200"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "usg9520",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c11"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "svn5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "tp3106",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r002c00"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00t"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c10"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "svn5600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "te50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "svn5600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "svn5800-c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "dp300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "svn5800-c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c01"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00t"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "usg9580",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c15"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "rse6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "max presence",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "rp200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16pwe"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "usg9520",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c20"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c00"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c17"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "rp200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "usg9580",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c20"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "te50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "nip6800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "usg9560",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c20"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "usg9560",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "svn5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "tp3206",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r002c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar120-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "dp300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "max presence",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9520 v300r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9560 v300r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9580 v300r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "dp300 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "tp3106 v100r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "viewpoint v100r011c03",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "9030"
      },
      {
        "model": "viewpoint v100r011c02",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "9030"
      },
      {
        "model": "smc2.0 v100r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "max presence v100r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "tp3206 v100r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rp200 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rse6500 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te50 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te50 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r006c12",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c11",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c12",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c15",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c16",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c17",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v100r001c10spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v100r001c10spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r002c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6800 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rp200 v500r002c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5600 v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5600 v200r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800-c v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800-c v200r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800 v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800 v200r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "semg9811 v300r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9520 v300r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9560 v300r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9580 v300r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v500r002c00t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v600r006c00t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35592"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012503"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1149"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-15332"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:ar120-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:dp300_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ips_module_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:max_presence_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ngfw_module_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012503"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei internal tester",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1149"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2017-15332",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-15332",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-35592",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-106144",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-15332",
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-15332",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-15332",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-35592",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201711-1149",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-106144",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35592"
      },
      {
        "db": "VULHUB",
        "id": "VHN-106144"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012503"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1149"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-15332"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device. plural Huawei The product contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei AR and SRG series enterprise routers are Huawei\u0027s all-in-one routers for small and medium-sized offices or small and medium-sized enterprises. Huawei\u0027s SVN series products are Huawei\u0027s secure access gateway products; NIP6300/6600 series products and SecospaceUSG series. Huawei is a new generation of professional intrusion prevention and firewall products for customers such as enterprises, IDCs, campus networks and operators. The TE series is a high definition video conferencing terminal that supports 1080p60. The vulnerability was caused by the program failing to fully verify the message. Huawei AR120-S and others are all routers of China Huawei (Huawei). H323 protocol is one of the audio and video protocols. The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version , V200R007C00, V200R008C20, V200R008C30; AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30-S; AR15",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-15332"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012503"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-35592"
      },
      {
        "db": "VULHUB",
        "id": "VHN-106144"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-15332",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012503",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1149",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-35592",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-106144",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35592"
      },
      {
        "db": "VULHUB",
        "id": "VHN-106144"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012503"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1149"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-15332"
      }
    ]
  },
  "id": "VAR-201802-0545",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35592"
      },
      {
        "db": "VULHUB",
        "id": "VHN-106144"
      }
    ],
    "trust": 1.6440408519594594
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35592"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:26:28.639000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20171129-01-h323",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
      },
      {
        "title": "Patches for various Huawei product H323 protocol memory leak vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/107345"
      },
      {
        "title": "Multiple Huawei product H323 Fixing measures for protocol security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76804"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35592"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012503"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1149"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-772",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-399",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-106144"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012503"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-15332"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-15332"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15332"
      },
      {
        "trust": 0.6,
        "url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171129-01-h323-cn"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35592"
      },
      {
        "db": "VULHUB",
        "id": "VHN-106144"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012503"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1149"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-15332"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35592"
      },
      {
        "db": "VULHUB",
        "id": "VHN-106144"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012503"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1149"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-15332"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-35592"
      },
      {
        "date": "2018-02-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-106144"
      },
      {
        "date": "2018-03-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-012503"
      },
      {
        "date": "2017-11-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-1149"
      },
      {
        "date": "2018-02-15T16:29:00.377000",
        "db": "NVD",
        "id": "CVE-2017-15332"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-35592"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-106144"
      },
      {
        "date": "2018-03-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-012503"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-1149"
      },
      {
        "date": "2024-11-21T03:14:28.893000",
        "db": "NVD",
        "id": "CVE-2017-15332"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1149"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Resource management vulnerabilities in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012503"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1149"
      }
    ],
    "trust": 0.6
  }
}

var-201711-1008
Vulnerability from variot

AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The AR series, SRG series, and NetEngine16EX service routing gateways are Huawei's all-in-one integrated service gateways for small and medium-sized branches and small and medium-sized enterprises. Huawei SMC2.0 is a video service management platform. A cross-border read vulnerability exists in several Huawei products due to the device's failure to fully verify user input. Huawei AR120-S and others are all router products of China Huawei (Huawei). There are security vulnerabilities in several Huawei products. The vulnerability is caused by the program's insufficient implementation of input validation. The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR150 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR150-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR160 V200R006C10 Version, V200R006C12 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR200 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R008C20 Version, V200R008C30 Version; AR200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR2200

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201711-1008",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r006c16pwe"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c11"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c00"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c17"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c10"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c15"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar120-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r006c12",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c11",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c12",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c15",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c16",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c17",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34449"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010624"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-968"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8163"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:ar120-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar1200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar1200-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar150_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar150-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar160_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar200-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar2200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar2200-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar3200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar510_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:netengine16ex_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:smc2.0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:srg1300_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:srg2300_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:srg3300_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010624"
      }
    ]
  },
  "cve": "CVE-2017-8163",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "CVE-2017-8163",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2017-34449",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "VHN-116366",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.8,
            "id": "CVE-2017-8163",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-8163",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-8163",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-34449",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201711-968",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-116366",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34449"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116366"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010624"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-968"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8163"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The AR series, SRG series, and NetEngine16EX service routing gateways are Huawei\u0027s all-in-one integrated service gateways for small and medium-sized branches and small and medium-sized enterprises. Huawei SMC2.0 is a video service management platform. A cross-border read vulnerability exists in several Huawei products due to the device\u0027s failure to fully verify user input. Huawei AR120-S and others are all router products of China Huawei (Huawei). There are security vulnerabilities in several Huawei products. The vulnerability is caused by the program\u0027s insufficient implementation of input validation. The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR150 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR150-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR160 V200R006C10 Version, V200R006C12 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR200 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R008C20 Version, V200R008C30 Version; AR200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR2200",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-8163"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010624"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34449"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116366"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-8163",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010624",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-968",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34449",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-116366",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34449"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116366"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010624"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-968"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8163"
      }
    ]
  },
  "id": "VAR-201711-1008",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34449"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116366"
      }
    ],
    "trust": 1.6829639047777776
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34449"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:52:15.750000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20171018-01-h323",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
      },
      {
        "title": "Patch of various Huawei products beyond the boundary read vulnerability (CNVD-2017-34449)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/106350"
      },
      {
        "title": "Multiple Huawei Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76678"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34449"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010624"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-968"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-125",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-116366"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010624"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8163"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8163"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-8163"
      },
      {
        "trust": 0.6,
        "url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171018-01-h323-cn"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34449"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116366"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010624"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-968"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8163"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34449"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116366"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010624"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-968"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8163"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-34449"
      },
      {
        "date": "2017-11-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116366"
      },
      {
        "date": "2017-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010624"
      },
      {
        "date": "2017-11-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-968"
      },
      {
        "date": "2017-11-22T19:29:03.803000",
        "db": "NVD",
        "id": "CVE-2017-8163"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-34449"
      },
      {
        "date": "2017-12-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116366"
      },
      {
        "date": "2017-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010624"
      },
      {
        "date": "2017-11-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-968"
      },
      {
        "date": "2024-11-21T03:33:26.833000",
        "db": "NVD",
        "id": "CVE-2017-8163"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-968"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Product out-of-bounds vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010624"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-968"
      }
    ],
    "trust": 0.6
  }
}

var-202007-0476
Vulnerability from variot

The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en. plural Huawei The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state. Huawei AR1200, etc. are all enterprise routers of China's Huawei (Huawei) company

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0476",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "usg9500 v500r001c00",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v600r006c00",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c50",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c30",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01spc300"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc700"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc400t"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03b013sp02"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc201b023t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc203t"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd04t"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10spc300"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03b012sp16"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc101tb015"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc800t"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph309"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc300t"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc100"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "te50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc405t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc200"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc900"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph309"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc200b022t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd05t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc700"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcf00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900t"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spce01t"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc200"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc200"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd03t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcc00"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc502"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd02t"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc102"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcb00"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc100"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc700"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc100"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc700t"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c02spc200"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc001t"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc800"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc101"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca00t"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc100"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc103t"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03lgwl01spc100"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc100"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c00"
      },
      {
        "model": "usg9520",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spc800pwe"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c17"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc104t"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc700"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcj00"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "nip6800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc201t"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc400"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc403t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc300"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "semg9811",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spca00"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00spc300t"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc402t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600t"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc180t"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd01t"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc202b025t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc900"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc700"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spca00"
      },
      {
        "model": "nip6800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc204t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc201t"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc400"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc600"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20lcrw01t"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01spc500"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc400"
      },
      {
        "model": "semg9811",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spc700"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc702t"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc400"
      },
      {
        "model": "svn5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "tp3206",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r002c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc700"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc600"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c02spc100"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc300"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc200"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc500"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c11"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "svn5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc300"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03b012sp15"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph309"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spch00"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc200"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc500"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc400b001"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc102t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc203t"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcg00"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc700"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc200"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c10"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc500"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc800"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "te50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500t"
      },
      {
        "model": "svn5600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc103"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00spc200"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd00t"
      },
      {
        "model": "te50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc703t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc206t"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c01spc500t"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c01spc100"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc500"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc901t"
      },
      {
        "model": "svn5600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spcb00"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03b015sp03"
      },
      {
        "model": "svn5800-c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc800"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc600"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01spc600"
      },
      {
        "model": "dp300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00spc200t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc208t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca02t"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc207t"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "svn5800-c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00spc301t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc400"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03b013sp04"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10t"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc500"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc800"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca01t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc206t"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spci00"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c15"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spca00"
      },
      {
        "model": "rse6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc300"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca01"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01sph703"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10spc100t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc400"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spcc00"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc100"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "semg9811",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spc500"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc100b015t"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16pwe"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc800"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc101b001t"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spcb00"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10spc100"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc300"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c02spc100"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03b013sp03"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph702"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb01t"
      },
      {
        "model": "usg9560",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c20spc300"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc209t"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc300"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03lgwl01spc100b012"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc100"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcd00"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc300"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc205t"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c01spc500"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01spc400"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spca00"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "semg9811",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spc500t"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc900"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc404t"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc600"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc701t"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcc00"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc401t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spce00"
      },
      {
        "model": "ar120-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r003c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1981 v200r003c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "dp300 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1981 v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1981 v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc101b001t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc102",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc103",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc201t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "tp3206 v100r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rse6500 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te50 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r006c12",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c16pwe",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c11",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c12",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c15",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c16",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c17",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r002c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6800 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5600 v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5600 v200r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800-c v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800-c v200r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800 v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800 v200r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v500r002c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v500r002c00spc600",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v500r002c00spc700",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v500r002c00spc900",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v500r002c00spcb00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v500r002c00spc600",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v500r002c00spc700",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v500r002c00spc900",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v500r002c00spcb00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te50 v500r002c00spc600",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te50 v500r002c00spcb00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3600 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3600 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3600 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3600 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v100r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v600r006c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10spc400",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10spc500",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10spc600",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spc600",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spc700",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spc800",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spc900",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spca00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spcb00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c01spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10spc300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10spc800",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1981 v100r001c20spc700",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1981 v200r003c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6800 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r007c00spc900",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r006c10spc300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "semg9811 v300r001c01spc500",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "semg9811 v300r001c01spc500t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "semg9811 v300r001c01spc700",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "semg9811 v300r001c01spca00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r001c01spc300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r001c01spc400",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r001c01spc500",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r001c01spc600",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r001c01sph703",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r003c00spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r003c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r003c00spc300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r003c00spc500",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9520 v300r001c01spc800pwe",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9560 v300r001c20spc300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c02spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c02spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c02spc300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c02spc300t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c02spc400",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c30spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c30spc100b015t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c30spc101",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c30spc101tb015",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c30spc102t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-52408"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015759"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19415"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:ar120-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar1200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar1200-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar150_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar150-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar160_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar200-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar2200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar2200-s_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015759"
      }
    ]
  },
  "cve": "CVE-2019-19415",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-19415",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-015759",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2020-52408",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-19415",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-015759",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-19415",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2019-015759",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-52408",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202007-385",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-52408"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015759"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-385"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19415"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en. plural Huawei The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state. Huawei AR1200, etc. are all enterprise routers of China\u0027s Huawei (Huawei) company",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-19415"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015759"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-52408"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-19415",
        "trust": 3.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015759",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-52408",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-385",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-52408"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015759"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-385"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19415"
      }
    ]
  },
  "id": "VAR-202007-0476",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-52408"
      }
    ],
    "trust": 1.5390053986010361
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-52408"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:33:24.650000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20200115-01-sip",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
      },
      {
        "title": "Patch for Input verification vulnerabilities in multiple Huawei products (CNVD-2020-52408)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/234367"
      },
      {
        "title": "Multiple Huawei Product input verification error vulnerability fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=123633"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-52408"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015759"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-385"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-119",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015759"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19415"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19415"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19415"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-52408"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015759"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-385"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19415"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-52408"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015759"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-385"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19415"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-09-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-52408"
      },
      {
        "date": "2020-08-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-015759"
      },
      {
        "date": "2020-07-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202007-385"
      },
      {
        "date": "2020-07-08T17:15:09.513000",
        "db": "NVD",
        "id": "CVE-2019-19415"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-09-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-52408"
      },
      {
        "date": "2020-08-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-015759"
      },
      {
        "date": "2020-07-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202007-385"
      },
      {
        "date": "2024-11-21T04:34:43.987000",
        "db": "NVD",
        "id": "CVE-2019-19415"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-385"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Product input verification vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015759"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-385"
      }
    ],
    "trust": 0.6
  }
}

var-202007-0477
Vulnerability from variot

The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en. plural Huawei The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state. Huawei AR1200 and others are all enterprise routers of China's Huawei (Huawei) company

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0477",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "secospace usg6300 v500r001c00",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c00",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v600r006c00",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c50",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c30",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01spc300"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc700"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc400t"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03b013sp02"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc201b023t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc203t"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd04t"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10spc300"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03b012sp16"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc101tb015"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc800t"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph309"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc300t"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc100"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "te50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc405t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc200"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc900"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph309"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc200b022t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd05t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc700"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcf00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900t"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spce01t"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc200"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc200"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd03t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcc00"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc502"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd02t"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc102"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcb00"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc100"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc700"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc100"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc700t"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c02spc200"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc001t"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc800"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc101"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca00t"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc100"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc103t"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03lgwl01spc100"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc100"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c00"
      },
      {
        "model": "usg9520",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spc800pwe"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c17"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc104t"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc700"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcj00"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "nip6800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc201t"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc400"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc403t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc300"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "semg9811",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spca00"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00spc300t"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc402t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600t"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc180t"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd01t"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc202b025t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc900"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc700"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spca00"
      },
      {
        "model": "nip6800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc204t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc201t"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc400"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc600"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20lcrw01t"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01spc500"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc400"
      },
      {
        "model": "semg9811",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spc700"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc702t"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc400"
      },
      {
        "model": "svn5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "tp3206",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r002c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc700"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc600"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c02spc100"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc300"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc200"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc500"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c11"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "svn5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc300"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03b012sp15"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph309"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spch00"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc200"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc500"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc400b001"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc102t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc203t"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcg00"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc700"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc200"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c10"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc500"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc800"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "te50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500t"
      },
      {
        "model": "svn5600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc103"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00spc200"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd00t"
      },
      {
        "model": "te50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc703t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc206t"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c01spc500t"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c01spc100"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc500"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc901t"
      },
      {
        "model": "svn5600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spcb00"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03b015sp03"
      },
      {
        "model": "svn5800-c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc800"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc600"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01spc600"
      },
      {
        "model": "dp300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00spc200t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc208t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca02t"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc207t"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "svn5800-c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00spc301t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc400"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03b013sp04"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10t"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc500"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc800"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca01t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc206t"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spci00"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c15"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spca00"
      },
      {
        "model": "rse6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc300"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca01"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01sph703"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10spc100t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc400"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spcc00"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc100"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "semg9811",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spc500"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc100b015t"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16pwe"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc800"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc101b001t"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spcb00"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10spc100"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc300"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c02spc100"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03b013sp03"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph702"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb01t"
      },
      {
        "model": "usg9560",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c20spc300"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc209t"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc300"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03lgwl01spc100b012"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc100"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcd00"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc300"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc205t"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c01spc500"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01spc400"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spca00"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "semg9811",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spc500t"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc900"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc404t"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc600"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc701t"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcc00"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc401t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spce00"
      },
      {
        "model": "ar120-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r003c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "dp300 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc102",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc103",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc201t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "tp3206 v100r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rse6500 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te50 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v500r002c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r006c12",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c16pwe",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c11",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c12",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c15",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c16",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c17",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r002c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6800 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5600 v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5600 v200r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800-c v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800-c v200r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800 v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800 v200r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v500r002c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v500r002c00spc600",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v500r002c00spc700",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v500r002c00spc900",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v500r002c00spcb00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v500r002c00spc600",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v500r002c00spc700",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v500r002c00spc900",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v500r002c00spcb00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te50 v500r002c00spc600",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te50 v500r002c00spcb00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3600 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3600 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3600 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3600 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v100r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6600 v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v600r006c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10spc400",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10spc500",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10spc600",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spc600",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spc700",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spc800",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spc900",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spca00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00spcb00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c01spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10spc300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10spc800",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6800 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r007c00spc900",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r006c10spc300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "semg9811 v300r001c01spc500",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "semg9811 v300r001c01spc500t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "semg9811 v300r001c01spc700",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "semg9811 v300r001c01spca00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r001c01spc300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r001c01spc400",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r001c01spc500",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r001c01spc600",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r001c01sph703",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r003c00spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r003c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r003c00spc500",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9520 v300r001c01spc800pwe",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9560 v300r001c20spc300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c02spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c02spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c02spc300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c02spc300t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c02spc400",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c30spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c30spc100b015t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c30spc101",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c30spc101tb015",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c30spc102t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-46470"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015760"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19416"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:ar120-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar1200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar1200-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar150_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar150-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar160_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar200-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar2200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar2200-s_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015760"
      }
    ]
  },
  "cve": "CVE-2019-19416",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-19416",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-015760",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2020-46470",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-19416",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-015760",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-19416",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2019-015760",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-46470",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202007-387",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-46470"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015760"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-387"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19416"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en. plural Huawei The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state. Huawei AR1200 and others are all enterprise routers of China\u0027s Huawei (Huawei) company",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-19416"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015760"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-46470"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-19416",
        "trust": 3.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015760",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-46470",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-387",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-46470"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015760"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-387"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19416"
      }
    ]
  },
  "id": "VAR-202007-0477",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-46470"
      }
    ],
    "trust": 1.5381384666666664
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-46470"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:11:26.485000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20200115-01-sip",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
      },
      {
        "title": "Patch for Input verification vulnerabilities in multiple Huawei products (CNVD-2020-46470)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/230839"
      },
      {
        "title": "Multiple Huawei Product input verification error vulnerability fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=123634"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-46470"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015760"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-387"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-119",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015760"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19416"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19416"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19416"
      },
      {
        "trust": 0.6,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200115-01-sip-cn"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-46470"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015760"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-387"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19416"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-46470"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015760"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-387"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19416"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-08-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-46470"
      },
      {
        "date": "2020-08-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-015760"
      },
      {
        "date": "2020-07-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202007-387"
      },
      {
        "date": "2020-07-08T17:15:09.577000",
        "db": "NVD",
        "id": "CVE-2019-19416"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-08-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-46470"
      },
      {
        "date": "2020-08-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-015760"
      },
      {
        "date": "2020-07-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202007-387"
      },
      {
        "date": "2024-11-21T04:34:44.310000",
        "db": "NVD",
        "id": "CVE-2019-19416"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-387"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Product input verification vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015760"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-387"
      }
    ],
    "trust": 0.6
  }
}

var-202101-0997
Vulnerability from variot

There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products. SMC2.0 Is vulnerable to a lack of authentication.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Mate 30 is a smart phone of China's Huawei (Huawei) company.

Huawei Mate 30 has a buffer overflow vulnerability, which can be exploited by attackers by sending carefully crafted packets with specific parameters to the target device. Due to insufficient verification of the parameters, a successful attack may cause abnormal device behavior

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0997",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c10spcc00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c10spc601"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c10spc800"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c10spc500"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c10"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00spc700"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c10spce00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c10spcb00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00spc800"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c10spcd00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c10spc600"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c10spc602"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c10spca00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c10spc700"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "smc2.0  firmware"
      },
      {
        "model": "mate",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "30"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-05397"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-015377"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9209"
      }
    ]
  },
  "cve": "CVE-2020-9209",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2020-9209",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2021-05397",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 0.8,
            "id": "CVE-2020-9209",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 6.7,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2020-9209",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "High",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2020-9209",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2020-9209",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2021-05397",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202012-1884",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-9209",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-05397"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9209"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-015377"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1884"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9209"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products. SMC2.0 Is vulnerable to a lack of authentication.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Mate 30 is a smart phone of China\u0027s Huawei (Huawei) company. \n\r\n\r\nHuawei Mate 30 has a buffer overflow vulnerability, which can be exploited by attackers by sending carefully crafted packets with specific parameters to the target device. Due to insufficient verification of the parameters, a successful attack may cause abnormal device behavior",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-9209"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-015377"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-05397"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9209"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-9209",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-015377",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-05397",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1884",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9209",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-05397"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9209"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-015377"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1884"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9209"
      }
    ]
  },
  "id": "VAR-202101-0997",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-05397"
      }
    ],
    "trust": 1.26765326
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-05397"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:05:17.115000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20201230-01-pe",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en"
      },
      {
        "title": "Patch for Huawei Mate 30 buffer overflow vulnerability (CNVD-2021-05397)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/245158"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-05397"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-015377"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-862",
        "trust": 1.0
      },
      {
        "problemtype": "Lack of authentication (CWE-862) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-015377"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9209"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9209"
      },
      {
        "trust": 1.7,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en"
      },
      {
        "trust": 0.6,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20201230-01-pe-cn"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/269.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-05397"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9209"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-015377"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1884"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9209"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-05397"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9209"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-015377"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1884"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9209"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-01-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-05397"
      },
      {
        "date": "2021-01-13T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-9209"
      },
      {
        "date": "2021-09-17T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-015377"
      },
      {
        "date": "2020-12-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202012-1884"
      },
      {
        "date": "2021-01-13T23:15:13.807000",
        "db": "NVD",
        "id": "CVE-2020-9209"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-01-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-05397"
      },
      {
        "date": "2021-01-19T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-9209"
      },
      {
        "date": "2021-09-17T07:58:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-015377"
      },
      {
        "date": "2021-01-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202012-1884"
      },
      {
        "date": "2024-11-21T05:40:10.383000",
        "db": "NVD",
        "id": "CVE-2020-9209"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1884"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SMC2.0\u00a0 Vulnerability in Microsoft",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-015377"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1884"
      }
    ],
    "trust": 0.6
  }
}

var-201802-0298
Vulnerability from variot

Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01, V300R001C00 have a weak cryptography vulnerability. Due to not properly some values in the certificates, an unauthenticated remote attacker could forges a specific RSA certificate and exploits the vulnerability to pass identity authentication and logs into the target device to obtain permissions configured for the specific user name. plural Huawei The product contains cryptographic vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei AR120-S is a router product of China Huawei. A weak encryption algorithm vulnerability exists in several Huawei products because the program failed to correctly parse the value in the certificate. A remote attacker can exploit this vulnerability to forge an RSA signature with a specially crafted certificate. There are security vulnerabilities in several Huawei products. The following products and versions are affected: Huawei AR120-S V200R005C32 Version, V200R006C10 Version, V200R007C00 Version, V200R008C20 Version; AR1200 V200R005C20 Version, V200R005C32 Version, V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version; AR1200-S V200R005C32 Version , V200R006C10 version, V200R007C00 version, V200R008C20; AR150, etc

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0298",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cloudengine 6800",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r006c00"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r008c03"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "cloudengine 6800",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "cloudengine 6800",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "espace iad",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v300r002c01"
      },
      {
        "model": "cloudengine 5800",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "espace usm",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r001c01"
      },
      {
        "model": "espace usm",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v300r001c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "cloudengine 6800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "cloudengine 7800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "cloudengine 7800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "cloudengine 6800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c10"
      },
      {
        "model": "cloudengine 5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c00"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c20"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "cloudengine 12800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "cloudengine 5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "cloudengine 5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c10"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c11"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "cloudengine 7800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c00"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c02"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "cloudengine 5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "cloudengine 5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "cloudengine 12800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c10"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "cloudengine 12800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "cloudengine 12800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c10"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "cloudengine 12800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "cloudengine 7800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c10"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "cloudengine 6800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "dp300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "cloudengine 7800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006c00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "cloudengine 7800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "cloudengine 12800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar120-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cloudengine 12800",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "dp300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace iad",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "viewpoint 8660",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r005c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r005c32",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r005c32",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r005c32",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r005c32",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r005c32",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r005c32",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r005c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r005c32",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r005c32",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c11",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3600 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3600 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3600 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3600 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r005c32",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cloudengine v100r003c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "12800"
      },
      {
        "model": "cloudengine v100r003c10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "12800"
      },
      {
        "model": "cloudengine v100r005c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "12800"
      },
      {
        "model": "cloudengine v100r005c10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "12800"
      },
      {
        "model": "cloudengine v100r006c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "12800"
      },
      {
        "model": "cloudengine v100r002c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "12800"
      },
      {
        "model": "cloudengine v200r001c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "12800"
      },
      {
        "model": "cloudengine v100r003c10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5800"
      },
      {
        "model": "cloudengine v100r005c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5800"
      },
      {
        "model": "cloudengine v100r005c10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5800"
      },
      {
        "model": "cloudengine v100r006c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5800"
      },
      {
        "model": "cloudengine v100r002c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5800"
      },
      {
        "model": "cloudengine v100r003c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5800"
      },
      {
        "model": "cloudengine v200r001c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5800"
      },
      {
        "model": "cloudengine v100r003c10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "6800"
      },
      {
        "model": "cloudengine v100r005c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "6800"
      },
      {
        "model": "cloudengine v100r005c10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "6800"
      },
      {
        "model": "cloudengine v100r006c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "6800"
      },
      {
        "model": "cloudengine v100r002c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "6800"
      },
      {
        "model": "cloudengine v100r003c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "6800"
      },
      {
        "model": "cloudengine v200r001c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "6800"
      },
      {
        "model": "cloudengine v100r003c10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "7800"
      },
      {
        "model": "cloudengine v100r005c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "7800"
      },
      {
        "model": "cloudengine v100r005c10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "7800"
      },
      {
        "model": "cloudengine v100r006c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "7800"
      },
      {
        "model": "cloudengine v100r003c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "7800"
      },
      {
        "model": "cloudengine v200r001c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "7800"
      },
      {
        "model": "dp300 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg1300 v200r005c32",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r005c32",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r005c32",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v200r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vp9660 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "viewpoint v100r008c03",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "8660"
      },
      {
        "model": "viewpoint v100r008c02",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "8660"
      },
      {
        "model": "espace iad v300r002c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1981 v200r003c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1981 v200r003c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace usm v100r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace usm v300r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-38101"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012621"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-871"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-17301"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:ar120-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:cloudengine_12800_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:dp300_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:espace_iad_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:smc2.0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:srg1300_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:te30_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:viewpoint_8660_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:vp9660_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012621"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei internal tester",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-871"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2017-17301",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-17301",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-38101",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-108310",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-17301",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-17301",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-17301",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-38101",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201712-871",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-108310",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-38101"
      },
      {
        "db": "VULHUB",
        "id": "VHN-108310"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012621"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-871"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-17301"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01, V300R001C00 have a weak cryptography vulnerability. Due to not properly some values in the certificates, an unauthenticated remote attacker could forges a specific RSA certificate and exploits the vulnerability to pass identity authentication and logs into the target device to obtain permissions configured for the specific user name. plural Huawei The product contains cryptographic vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei AR120-S is a router product of China Huawei. A weak encryption algorithm vulnerability exists in several Huawei products because the program failed to correctly parse the value in the certificate. A remote attacker can exploit this vulnerability to forge an RSA signature with a specially crafted certificate. There are security vulnerabilities in several Huawei products. The following products and versions are affected: Huawei AR120-S V200R005C32 Version, V200R006C10 Version, V200R007C00 Version, V200R008C20 Version; AR1200 V200R005C20 Version, V200R005C32 Version, V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version; AR1200-S V200R005C32 Version , V200R006C10 version, V200R007C00 version, V200R008C20; AR150, etc",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-17301"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012621"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-38101"
      },
      {
        "db": "VULHUB",
        "id": "VHN-108310"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-17301",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012621",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-871",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-38101",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-108310",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-38101"
      },
      {
        "db": "VULHUB",
        "id": "VHN-108310"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012621"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-871"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-17301"
      }
    ]
  },
  "id": "VAR-201802-0298",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-38101"
      },
      {
        "db": "VULHUB",
        "id": "VHN-108310"
      }
    ],
    "trust": 1.6437164293396223
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-38101"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:12:40.694000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20171222-01-cryptography",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en"
      },
      {
        "title": "Patches for multiple Huawei product weak encryption algorithm vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/111723"
      },
      {
        "title": "Multiple Huawei Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=77320"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-38101"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012621"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-871"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-295",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-310",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-108310"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012621"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-17301"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17301"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17301"
      },
      {
        "trust": 0.6,
        "url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171222-01-cryptography-cn"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-38101"
      },
      {
        "db": "VULHUB",
        "id": "VHN-108310"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012621"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-871"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-17301"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-38101"
      },
      {
        "db": "VULHUB",
        "id": "VHN-108310"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012621"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-871"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-17301"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-12-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-38101"
      },
      {
        "date": "2018-02-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-108310"
      },
      {
        "date": "2018-03-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-012621"
      },
      {
        "date": "2017-12-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201712-871"
      },
      {
        "date": "2018-02-15T16:29:03.610000",
        "db": "NVD",
        "id": "CVE-2017-17301"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-12-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-38101"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-108310"
      },
      {
        "date": "2018-03-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-012621"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201712-871"
      },
      {
        "date": "2024-11-21T03:17:47.340000",
        "db": "NVD",
        "id": "CVE-2017-17301"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-871"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Cryptographic vulnerabilities in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012621"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201712-871"
      }
    ],
    "trust": 0.6
  }
}

var-201711-1028
Vulnerability from variot

Huawei SMC2.0 with software of V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00, V600R006C00 has an input validation vulnerability when handle TLS and DTLS handshake with certificate. Due to the insufficient validation of received PKI certificates, remote attackers could exploit this vulnerability to crash the TLS module. Multiple Huawei products are prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. Huawei SMC2.0 is a set of video management solutions of China Huawei (Huawei). The solution supports H.323 and SIP two mainstream protocols at the same time, and supports the access of devices such as computers and mobile phones. The following versions are affected: Huawei SMC2.0 V100R003C10 Version, V100R005C00SPC100 Version, V100R005C00SPC101B001T Version, V100R005C00SPC102 Version, V100R005C00SPC103 Version, V100R005C00SPC200 Version, V100R005C00SPC201T Version, V500R002C00 Version, V600R006C00 Version

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201711-1028",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v100r005c00spc100"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v100r005c00spc101b001t"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v100r005c00spc102"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v100r005c00spc103"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v100r005c00spc200"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v100r005c00spc201t"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "smc2.0 v600r006c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v500r002c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc201t",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc200",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc103",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc102",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00spc100",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r003c10",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v600r006c00spc300",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v500r002c00spcc00",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "100350"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010590"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201707-653"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8213"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:smc2.0_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010590"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201707-653"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2017-8213",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-8213",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-116416",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-8213",
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-8213",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-8213",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201707-653",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-116416",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-116416"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010590"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201707-653"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8213"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei SMC2.0 with software of V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00, V600R006C00 has an input validation vulnerability when handle TLS and DTLS handshake with certificate. Due to the insufficient validation of received PKI certificates, remote attackers could exploit this vulnerability to crash the TLS module. Multiple Huawei products are prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause a denial-of-service condition. Huawei SMC2.0 is a set of video management solutions of China Huawei (Huawei). The solution supports H.323 and SIP two mainstream protocols at the same time, and supports the access of devices such as computers and mobile phones. The following versions are affected: Huawei SMC2.0 V100R003C10 Version, V100R005C00SPC100 Version, V100R005C00SPC101B001T Version, V100R005C00SPC102 Version, V100R005C00SPC103 Version, V100R005C00SPC200 Version, V100R005C00SPC201T Version, V500R002C00 Version, V600R006C00 Version",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-8213"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010590"
      },
      {
        "db": "BID",
        "id": "100350"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116416"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-8213",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010590",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201707-653",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "100350",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-116416",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-116416"
      },
      {
        "db": "BID",
        "id": "100350"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010590"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201707-653"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8213"
      }
    ]
  },
  "id": "VAR-201711-1028",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-116416"
      }
    ],
    "trust": 0.9448119444444444
  },
  "last_update_date": "2024-11-23T23:02:19.086000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20170705-01-tls",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en"
      },
      {
        "title": "Huawei SMC2.0 Enter the fix for the verification vulnerability",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=71751"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010590"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201707-653"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-295",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-116416"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010590"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8213"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8213"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-8213"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com/en/"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170705-01-tls-en"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-116416"
      },
      {
        "db": "BID",
        "id": "100350"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010590"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201707-653"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8213"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-116416"
      },
      {
        "db": "BID",
        "id": "100350"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010590"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201707-653"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-8213"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116416"
      },
      {
        "date": "2017-07-05T00:00:00",
        "db": "BID",
        "id": "100350"
      },
      {
        "date": "2017-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010590"
      },
      {
        "date": "2017-07-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201707-653"
      },
      {
        "date": "2017-11-22T19:29:05.477000",
        "db": "NVD",
        "id": "CVE-2017-8213"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-12-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116416"
      },
      {
        "date": "2017-07-05T00:00:00",
        "db": "BID",
        "id": "100350"
      },
      {
        "date": "2017-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010590"
      },
      {
        "date": "2017-07-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201707-653"
      },
      {
        "date": "2024-11-21T03:33:32.940000",
        "db": "NVD",
        "id": "CVE-2017-8213"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201707-653"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei SMC2.0 Certificate validation vulnerability in other software",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010590"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201707-653"
      }
    ],
    "trust": 0.6
  }
}

var-202106-0605
Vulnerability from variot

There is a multiple threads race condition vulnerability in Huawei product. A race condition exists for concurrent I/O read by multiple threads. An attacker with the root permission can exploit this vulnerability by performing some operations. Successful exploitation of this vulnerability may cause the system to crash. Affected product versions include: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2.0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931. ManageOne and SMC2.0 Is vulnerable to a race condition.Denial of service (DoS) It may be put into a state. Huawei Manageone is a set of cloud data center management solutions of China Huawei (Huawei). The product supports unified management of heterogeneous cloud resource pools, and provides functions such as multi-level VDC matching customer organization model, service catalog planning, self-service, centralized alarm analysis, and intelligent operation and maintenance. Many Huawei products have security vulnerabilities. 0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0605",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c10spc703"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c10spc900"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c10spc920"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c10spc921"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c10spc931"
      },
      {
        "model": "manageone",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.1"
      },
      {
        "model": "manageone",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "6.5.1"
      },
      {
        "model": "manageone",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "8.0.0"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c10spc922"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c10spc702"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c10spc700"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c10spc930"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c10spc800"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r019c10spc910"
      },
      {
        "model": "manageone",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-008910"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22340"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vulnerability was discovered by Huawei\u0027s internal testing",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-1952"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2021-22340",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.7,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.4,
            "id": "CVE-2021-22340",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.7,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.4,
            "id": "VHN-380775",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:M/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 0.5,
            "id": "CVE-2021-22340",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 4.1,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2021-22340",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "High",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-22340",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-22340",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202106-1952",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-380775",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-22340",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380775"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22340"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-008910"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-1952"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22340"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "There is a multiple threads race condition vulnerability in Huawei product. A race condition exists for concurrent I/O read by multiple threads. An attacker with the root permission can exploit this vulnerability by performing some operations. Successful exploitation of this vulnerability may cause the system to crash. Affected product versions include: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2.0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931. ManageOne and  SMC2.0 Is vulnerable to a race condition.Denial of service  (DoS) It may be put into a state. Huawei Manageone is a set of cloud data center management solutions of China Huawei (Huawei). The product supports unified management of heterogeneous cloud resource pools, and provides functions such as multi-level VDC matching customer organization model, service catalog planning, self-service, centralized alarm analysis, and intelligent operation and maintenance. Many Huawei products have security vulnerabilities. 0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931 ",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-22340"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-008910"
      },
      {
        "db": "VULHUB",
        "id": "VHN-380775"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22340"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-22340",
        "trust": 3.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-008910",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-1952",
        "trust": 0.7
      },
      {
        "db": "CS-HELP",
        "id": "SB2021102124",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-380775",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22340",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380775"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22340"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-008910"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-1952"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22340"
      }
    ]
  },
  "id": "VAR-202106-0605",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380775"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T15:11:55.392000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20210428-01-racecondition",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en"
      },
      {
        "title": "Huawei Manageone Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=155504"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-008910"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-1952"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-362",
        "trust": 1.1
      },
      {
        "problemtype": "Race condition (CWE-362) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380775"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-008910"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22340"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22340"
      },
      {
        "trust": 0.6,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20210428-01-racecondition-cn"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021102124"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/362.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-380775"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22340"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-008910"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-1952"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22340"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-380775"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-22340"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-008910"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-1952"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-22340"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-06-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-380775"
      },
      {
        "date": "2021-06-29T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-22340"
      },
      {
        "date": "2022-03-31T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-008910"
      },
      {
        "date": "2021-06-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202106-1952"
      },
      {
        "date": "2021-06-29T19:15:09.180000",
        "db": "NVD",
        "id": "CVE-2021-22340"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-07-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-380775"
      },
      {
        "date": "2021-07-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-22340"
      },
      {
        "date": "2022-03-31T06:36:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-008910"
      },
      {
        "date": "2021-10-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202106-1952"
      },
      {
        "date": "2021-07-07T12:34:40.027000",
        "db": "NVD",
        "id": "CVE-2021-22340"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-1952"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ManageOne\u00a0 and \u00a0SMC2.0\u00a0 Race Vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-008910"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "competition condition problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-1952"
      }
    ],
    "trust": 0.6
  }
}

var-201504-0247
Vulnerability from variot

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue. The RC4 algorithm, as used in SSL/TLS is prone to a security weakness that may allow attackers to recover plain-text. Successfully exploiting this issue in conjunction with other latent vulnerabilities may allow attackers to gain access to sensitive information that may aid in further attacks. RC4 is a stream encryption algorithm with variable key length developed by American software developer Ronald Rivest. The algorithm consists of a pseudo-random number generator and an XOR operation, and supports encryption and decryption using the same key. There is a security loophole in the RC4 algorithm used in the TLS protocol and the SSL protocol. The loophole stems from the fact that the program does not correctly combine state data and key data during the initialization phase. A remote attacker can exploit this vulnerability to perform a plaintext-recovery attack on the initialization bytes in the data stream by sniffing specific network traffic and then conducting a brute force attack. v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI Performance for QA v9.0x, v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI for IP Multicast QA v9.0x, v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI for MPLS VPN v9.0x, v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI for IP Telephony v9.0x, v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI for NET v9.0x, v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI Performance for Metrics v9.0x, v9.1x, v9.2x, v10.0x HP Network Node Manager iSPI Performance for Traffic v9.0x, v9.1x, v9.2x, v10.0x

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2015-4000 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2015-0204 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following updates for HP Network Node Manager i and Smart Plugins (iSPIs)

HP Network Node Manager i and Smart Plugins (iSPIs) Version Link to update for CVE-2015-4000 (LogJam)

HP Network Node Manager i version v9.1x, v9.2x iSPI Performance for QA iSPI for IP Multicast iSPI for MPLS VPN iSPI for IP Telephony

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01704653

HP Network Node Manager iSPI for Metrics v9.1x, v9.2x https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01740484

HP Network Node Manager iSPI for Traffic v9.1x, v9.2x https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01740489

Note: v10.x is not affected by LogJam

HP Network Node Manager i and Smart Plugins (iSPIs) Version Link to update for CVE-2015-2808 (Bar Mitzvah)

HP Network Node Manager i version v9.1x, v9.2x, v10.x iSPI Performance for QA iSPI for IP Multicast iSPI for MPLS VPN iSPI for IP Telephony

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01704651

HP Network Node Manager iSPI for Metrics v9.1x, v9.2x, v10.0x https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01740486

HP Network Node Manager iSPI for Traffic v9.1x, v9.2x, v10.0x https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01740487

HP Network Node Manager i and Smart Plugins (iSPIs) Version Link to update for CVE-2015-0204 (Freak)

HP Network Node Manager i version v9.x, v10.x iSPI Performance for QA iSPI for IP Multicast iSPI for MPLS VPN iSPI for IP Telephony

https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01704633https://softwaresupport.hp.com/group/softwaresupport/ search-result/-/facetsearch/document/KM01704633

HP Network Node Manager iSPI for Metrics v9.1x, v9.2x https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01740481

HP Network Node Manager iSPI for Traffic v9.1x, v9.2x https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/KM01740488

Note: v10.x is not affected by FREAK

HISTORY Version:1 (rev.1) - 20 August 2015 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. HP Performance Manager v9.0x and v9.20. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201512-10

                                       https://security.gentoo.org/

Severity: Normal Title: Mozilla Products: Multiple vulnerabilities Date: December 30, 2015 Bugs: #545232, #554036, #556942, #564818, #568376 ID: 201512-10

Synopsis

Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird, the worst of which may allow user-assisted execution of arbitrary code.

Background

Mozilla Firefox is an open-source web browser and Mozilla Thunderbird an open-source email client, both from the Mozilla Project.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 www-client/firefox < 38.5.0 >= 38.5.0 2 www-client/firefox-bin < 38.5.0 >= 38.5.0 3 mail-client/thunderbird < 38.5.0 >= 38.5.0 4 mail-client/thunderbird-bin < 38.5.0 >= 38.5.0 ------------------------------------------------------------------- 4 affected packages

Description

Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Firefox users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-38.5.0"

All Firefox-bin users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-38.5.0"

All Thunderbird users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-38.5.0"=

All Thunderbird-bin users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-38.5.0"

References

[ 1 ] CVE-2015-0798 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0798 [ 2 ] CVE-2015-0799 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0799 [ 3 ] CVE-2015-0801 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0801 [ 4 ] CVE-2015-0802 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0802 [ 5 ] CVE-2015-0803 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0803 [ 6 ] CVE-2015-0804 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0804 [ 7 ] CVE-2015-0805 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0805 [ 8 ] CVE-2015-0806 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0806 [ 9 ] CVE-2015-0807 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0807 [ 10 ] CVE-2015-0808 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0808 [ 11 ] CVE-2015-0810 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0810 [ 12 ] CVE-2015-0811 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0811 [ 13 ] CVE-2015-0812 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0812 [ 14 ] CVE-2015-0813 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0813 [ 15 ] CVE-2015-0814 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0814 [ 16 ] CVE-2015-0815 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0815 [ 17 ] CVE-2015-0816 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0816 [ 18 ] CVE-2015-2706 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2706 [ 19 ] CVE-2015-2721 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721 [ 20 ] CVE-2015-2722 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2722 [ 21 ] CVE-2015-2724 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2724 [ 22 ] CVE-2015-2725 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2725 [ 23 ] CVE-2015-2726 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2726 [ 24 ] CVE-2015-2727 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2727 [ 25 ] CVE-2015-2728 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2728 [ 26 ] CVE-2015-2729 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2729 [ 27 ] CVE-2015-2730 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2730 [ 28 ] CVE-2015-2731 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2731 [ 29 ] CVE-2015-2733 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2733 [ 30 ] CVE-2015-2734 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2734 [ 31 ] CVE-2015-2735 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2735 [ 32 ] CVE-2015-2736 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2736 [ 33 ] CVE-2015-2737 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2737 [ 34 ] CVE-2015-2738 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2738 [ 35 ] CVE-2015-2739 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2739 [ 36 ] CVE-2015-2740 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2740 [ 37 ] CVE-2015-2741 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2741 [ 38 ] CVE-2015-2742 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2742 [ 39 ] CVE-2015-2743 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2743 [ 40 ] CVE-2015-2808 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2808 [ 41 ] CVE-2015-4000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000 [ 42 ] CVE-2015-4495 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4495 [ 43 ] CVE-2015-4513 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4513 [ 44 ] CVE-2015-4514 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4514 [ 45 ] CVE-2015-4515 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4515 [ 46 ] CVE-2015-4518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4518 [ 47 ] CVE-2015-7181 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181 [ 48 ] CVE-2015-7182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182 [ 49 ] CVE-2015-7183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183 [ 50 ] CVE-2015-7187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7187 [ 51 ] CVE-2015-7188 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7188 [ 52 ] CVE-2015-7189 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7189 [ 53 ] CVE-2015-7191 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7191 [ 54 ] CVE-2015-7192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7192 [ 55 ] CVE-2015-7193 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7193 [ 56 ] CVE-2015-7194 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7194 [ 57 ] CVE-2015-7195 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7195 [ 58 ] CVE-2015-7196 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7196 [ 59 ] CVE-2015-7197 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7197 [ 60 ] CVE-2015-7198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7198 [ 61 ] CVE-2015-7199 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7199 [ 62 ] CVE-2015-7200 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7200 [ 63 ] CVE-2015-7201 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7201 [ 64 ] CVE-2015-7202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7202 [ 65 ] CVE-2015-7203 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7203 [ 66 ] CVE-2015-7204 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7204 [ 67 ] CVE-2015-7205 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7205 [ 68 ] CVE-2015-7207 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7207 [ 69 ] CVE-2015-7208 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7208 [ 70 ] CVE-2015-7210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7210 [ 71 ] CVE-2015-7211 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7211 [ 72 ] CVE-2015-7212 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7212 [ 73 ] CVE-2015-7213 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7213 [ 74 ] CVE-2015-7214 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7214 [ 75 ] CVE-2015-7215 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7215 [ 76 ] CVE-2015-7216 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7216 [ 77 ] CVE-2015-7217 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7217 [ 78 ] CVE-2015-7218 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7218 [ 79 ] CVE-2015-7219 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7219 [ 80 ] CVE-2015-7220 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7220 [ 81 ] CVE-2015-7221 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7221 [ 82 ] CVE-2015-7222 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7222 [ 83 ] CVE-2015-7223 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7223

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201512-10

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5 . These vulnerabilities could be exploited remotely resulting in disclosure of information and other impacts including:

  • The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of MD5 in the signature algorithm of an X.509 certificate.
  • HPE iMC PLAT - Please refer to the RESOLUTION below for a list of impacted products.

  • iMC PLAT - Version: IMC PLAT 7.2, E0403P10

    • JD125A HP IMC Std S/W Platform w/100-node
    • JD126A HP IMC Ent S/W Platform w/100-node
    • JD808A HP IMC Ent Platform w/100-node License
    • JD814A HP A-IMC Enterprise Edition Software DVD Media
    • JD815A HP IMC Std Platform w/100-node License
    • JD816A HP A-IMC Standard Edition Software DVD Media
    • JF288AAE HP Network Director to Intelligent Management Center Upgrade E-LTU
    • JF289AAE HP Enterprise Management System to Intelligent Management Center Upgrade E-LTU
    • JF377A HP IMC Std S/W Platform w/100-node Lic
    • JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU
    • JF378A HP IMC Ent S/W Platform w/200-node Lic
    • JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU
    • JG546AAE HP IMC Basic SW Platform w/50-node E-LTU
    • JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
    • JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU
    • JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU
    • JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU
    • JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade 50-node and 150-AP E-LTU
    • JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point E-LTU
    • JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance Edition E-LTU
    • JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
    • JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance Edition E-LTU
    • JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with 200-node E-LTU

Note: Please contact HPE Technical Support if any assistance is needed acquiring the software updates. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04832246

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04832246 Version: 1

HPSBUX03512 SSRT102254 rev.1 - HP-UX Web Server Suite running Apache, Remote Denial of Service (DoS) and Other Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2015-10-15 Last Updated: 2015-10-15

Potential Security Impact: Remote Denial of Service (DoS), access restriction bypass, unauthorized modification, disclosure of information, local access restriction bypass

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX Web Server Suite running Apache. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) and other impacts including...

  • The TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as "Logjam" could be exploited remotely to allow unauthorized modification.
  • The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" could be exploited remotely to allow disclosure of information.

References:

CVE-2013-5704 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 CVE-2015-3183 CVE-2015-4000 - "Logjam" CVE-2015-2808 - "Bar Mitzvah" SSRT102254

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX Web Server Suite 2.2.15.21 Apache

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2013-5704 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2014-0118 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0226 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-0231 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-3183 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following software updates to resolve the vulnerabilities with HP-UX Web Server Suite running Apache.

The updates are available for download from http://software.hp.com

NOTE: HP-UX Web Server Suite v3.31 HPUXWSATW331 contains the following components:

- Apache v2.2.15.23
- Tomcat Servlet Engine 5.5.36.02
- PHP 5.2.17.04

HP-UX 11i Release Apache Depot name

B.11.23 (11i v2 32-bit) HP_UX_11.23_HP_UX_11.23_HPUXWS22ATW-B331-11-23-32.depot

B.11.23 (11i v2 64-bit) HP_UX_11.23_HP_UX_11.23_HPUXWS22ATW-B331-11-23-64.depot

MANUAL ACTIONS: Yes - Update Download and install the software update

PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.23

hpuxws22APACHE32.APACHE hpuxws22APACHE32.APACHE2 hpuxws22APACHE32.AUTH_LDAP hpuxws22APACHE32.AUTH_LDAP2 hpuxws22APACHE32.MOD_JK hpuxws22APACHE32.MOD_JK2 hpuxws22APACHE32.MOD_PERL hpuxws22APACHE32.MOD_PERL2 hpuxws22APACHE32.PHP hpuxws22APACHE32.PHP2 hpuxws22APACHE32.WEBPROXY hpuxws22APACHE32.WEBPROXY2 hpuxws22APACHE.APACHE hpuxws22APACHE.APACHE2 hpuxws22APACHE.AUTH_LDAP hpuxws22APACHE.AUTH_LDAP2 hpuxws22APACHE.MOD_JK hpuxws22APACHE.MOD_JK2 hpuxws22APACHE.MOD_PERL hpuxws22APACHE.MOD_PERL2 hpuxws22APACHE.PHP hpuxws22APACHE.PHP2 hpuxws22APACHE.WEBPROXY hpuxws22APACHE.WEBPROXY2 action: install revision B.2.2.15.18 or subsequent

hpuxws22TOMCAT32.TOMCAT hpuxws22TOMCAT.TOMCAT action: install revision C.6.0.35.01 or subsequent

END AFFECTED VERSIONS

HISTORY Version:1 (rev.1) - 15 October 2015 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. Customers unable to apply the update should contact HPE Support to discuss options. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Critical: java-1.7.0-openjdk security update Advisory ID: RHSA-2015:1229-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1229.html Issue date: 2015-07-15 CVE Names: CVE-2015-2590 CVE-2015-2601 CVE-2015-2621 CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 CVE-2015-4749 CVE-2015-4760 =====================================================================

  1. Summary:

Updated java-1.7.0-openjdk packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64

  1. Description:

The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit.

Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733)

A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748)

It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601)

A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808)

Note: With this update, OpenJDK now disables RC4 TLS/SSL cipher suites by default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug 1207101, linked to in the References section, for additional details about this change.

A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000)

Note: This update forces the TLS/SSL client implementation in OpenJDK to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Refer to Red Hat Bugzilla bug 1223211, linked to in the References section, for additional details about this change.

It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749)

Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632)

A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625)

Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.

All users of java-1.7.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect.

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1207101 - CVE-2015-2808 SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) 1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) 1242232 - CVE-2015-2628 OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) 1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) 1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) 1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) 1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) 1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) 1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) 1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) 1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) 1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401)

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm

i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm

x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

i386: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm

noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm

x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm

x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm

x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm

i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm

x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

i386: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm

noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm

x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm

i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm

x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

i386: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm

noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm

x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm

Red Hat Enterprise Linux Client (v. 7):

Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm

x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm

x86_64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm

x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm

x86_64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm

ppc64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm

s390x: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.s390x.rpm

x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.ael7b_1.src.rpm

ppc64le: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm

ppc64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm

s390x: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.s390x.rpm

x86_64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.ael7b_1.noarch.rpm

ppc64le: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm

x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm

x86_64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2015-2590 https://access.redhat.com/security/cve/CVE-2015-2601 https://access.redhat.com/security/cve/CVE-2015-2621 https://access.redhat.com/security/cve/CVE-2015-2625 https://access.redhat.com/security/cve/CVE-2015-2628 https://access.redhat.com/security/cve/CVE-2015-2632 https://access.redhat.com/security/cve/CVE-2015-2808 https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/cve/CVE-2015-4731 https://access.redhat.com/security/cve/CVE-2015-4732 https://access.redhat.com/security/cve/CVE-2015-4733 https://access.redhat.com/security/cve/CVE-2015-4748 https://access.redhat.com/security/cve/CVE-2015-4749 https://access.redhat.com/security/cve/CVE-2015-4760 https://access.redhat.com/security/updates/classification/#critical https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11 https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFVpliAXlSAg2UNWIIRAmDIAKC0SKJPEBiUrI0sgDcQMZTM/nm7nwCfUIje QU57Hj/UGZeY+OmKchPFPcI= =miFC -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201504-0247",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "jre 1.7.0 17",
        "scope": null,
        "trust": 1.8,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0 17",
        "scope": null,
        "trust": 1.5,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0 13",
        "scope": null,
        "trust": 1.5,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.7.0 45",
        "scope": null,
        "trust": 1.5,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 43",
        "scope": null,
        "trust": 1.5,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.6.0 39",
        "scope": null,
        "trust": 1.5,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "cognos metrics manager",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "cognos metrics manager",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "10.2.1"
      },
      {
        "model": "cognos metrics manager",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "10.2"
      },
      {
        "model": "cognos metrics manager",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "10.2.2"
      },
      {
        "model": "cognos metrics manager",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "10.1.1"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "oracle",
        "version": "1.7.072"
      },
      {
        "model": "jdk 1.7.0 45",
        "scope": null,
        "trust": 1.2,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "oracle",
        "version": "1.7.072"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "oracle",
        "version": "1.8.025"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "oracle",
        "version": "1.6.085"
      },
      {
        "model": "jdk 1.6.0 43",
        "scope": null,
        "trust": 1.2,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 38",
        "scope": null,
        "trust": 1.2,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "oracle",
        "version": "1.6.085"
      },
      {
        "model": "jre 1.7.0 13",
        "scope": null,
        "trust": 1.2,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "oracle",
        "version": "1.8.025"
      },
      {
        "model": "opensuse",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "13.2"
      },
      {
        "model": "sparc enterprise m8000",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "fujitsu",
        "version": "xcp"
      },
      {
        "model": "s3700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "integrated lights out manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "3.0.0"
      },
      {
        "model": "integrated lights out manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "3.2.11"
      },
      {
        "model": "opensuse",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "13.1"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "oceanstor s5800t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5720ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "sparc enterprise m3000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "fujitsu",
        "version": "xcp_1121"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "sparc enterprise m8000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "fujitsu",
        "version": "xcp_1121"
      },
      {
        "model": "linux enterprise desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "12"
      },
      {
        "model": "e6000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r002c01"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "12"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "oceanstor s5500t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "11.1.1.7.0"
      },
      {
        "model": "policy center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "policy center",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "quidway s9300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "8.0"
      },
      {
        "model": "s5700ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s5710hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor s6800t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.7"
      },
      {
        "model": "ultravr",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "5.0"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "12.04"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r002c04"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.4"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.5"
      },
      {
        "model": "s5700si",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "11.1.1.9.0"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "12.2.1.1.0"
      },
      {
        "model": "sparc enterprise m4000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "fujitsu",
        "version": "xcp_1121"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.6"
      },
      {
        "model": "linux enterprise software development kit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "12"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "12.2.1.2.0"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "5.0"
      },
      {
        "model": "sparc enterprise m5000",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "fujitsu",
        "version": "xcp"
      },
      {
        "model": "communications application session controller",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "3.9.0"
      },
      {
        "model": "s5710ei",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "linux enterprise software development kit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "s5700s-li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor 9000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "5.0"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.7"
      },
      {
        "model": "s5720hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r002c03"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r002c02"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "12.1.3.0.0"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.2"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "oceanstor 18800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "linux enterprise debuginfo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "sparc enterprise m3000",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "fujitsu",
        "version": "xcp"
      },
      {
        "model": "9700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "satellite",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "5.7"
      },
      {
        "model": "oceanstor vis6600t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "1.7"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "14.04"
      },
      {
        "model": "linux enterprise desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "s5700li",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "s12700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "15.04"
      },
      {
        "model": "communications policy management",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "9.9.2"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "satellite",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "5.6"
      },
      {
        "model": "oceanstor s2600t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor cse",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "oceanstor 18800f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "integrated lights out manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "4.0.4"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.6"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor replicationdirector",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "communications application session controller",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "3.0.0"
      },
      {
        "model": "e9000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "integrated lights out manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "4.0.0"
      },
      {
        "model": "sparc enterprise m9000",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "fujitsu",
        "version": "xcp"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.7"
      },
      {
        "model": "oceanstor 18500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "sparc enterprise m4000",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "fujitsu",
        "version": "xcp"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "suse",
        "version": "10"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "7.0"
      },
      {
        "model": "s5700hi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s6700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.1"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.4"
      },
      {
        "model": "sparc enterprise m5000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "fujitsu",
        "version": "xcp_1121"
      },
      {
        "model": "sparc enterprise m9000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "fujitsu",
        "version": "xcp_1121"
      },
      {
        "model": "oceanstor s5600t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2750",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor hvs85t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "jre 1.7.0 8",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0 21",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.6.081"
      },
      {
        "model": "jdk 1.6.0 40",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 65",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.6.0 41",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.6.0:update 75",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0:update 60",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.7.0 2",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 41",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.6.081"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.845"
      },
      {
        "model": "jre 1.6.0:update 75",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.840"
      },
      {
        "model": "jre 1.6.0 39",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 23",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.6.0 60",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.7.0 51",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.691"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.695"
      },
      {
        "model": "jre 1.8.0:update 5",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 28",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.845"
      },
      {
        "model": "jdk 1.8.0:update 5",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 60",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.7.0 4",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.776"
      },
      {
        "model": "jdk 1.6.0 28",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 26",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0 10",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0 14",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.7.0 10",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.6.0 45",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.7.0 15",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.7.0 21",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 71",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.7.0 40",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 40",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.780"
      },
      {
        "model": "jdk 1.6.0 24",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0 25",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.6.0 32",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0 2",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 24",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "bladecenter advanced management module 3.66k",
        "scope": null,
        "trust": 0.9,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "jre 1.7.0 12",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.7.0 9",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 22",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 32",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0 8",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.7.0 25",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.6.0 37",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 27",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.840"
      },
      {
        "model": "jdk 1.6.0 30",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.6.0 45",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0 51",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.695"
      },
      {
        "model": "jdk 1.6.0 71",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.8.020"
      },
      {
        "model": "jdk 1.7.0 40",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.6.0 26",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0 15",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.7.0 14",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.7"
      },
      {
        "model": "jre 1.6.0 30",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0 11",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.691"
      },
      {
        "model": "jdk 1.6.0 25",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.6.0 23",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.6.0 65",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.6.0 27",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.7.0:update 60",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.7.067"
      },
      {
        "model": "jdk 1.7.0 12",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre 1.7.0 11",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0 4",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.7.067"
      },
      {
        "model": "jdk 1.6.0 22",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.776"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.8.020"
      },
      {
        "model": "jre 1.6.0 25",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jdk 1.7.0 9",
        "scope": null,
        "trust": 0.9,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "oracle",
        "version": "1.780"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "oracle",
        "version": "1.6.034"
      },
      {
        "model": "power",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ibm",
        "version": "5700"
      },
      {
        "model": "jre",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "oracle",
        "version": "1.8"
      },
      {
        "model": "jdk",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "oracle",
        "version": "1.8.0"
      },
      {
        "model": "jre",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "oracle",
        "version": "1.8.0"
      },
      {
        "model": "jdk 1.6.0 38",
        "scope": null,
        "trust": 0.6,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "oracle",
        "version": "1.6.035"
      },
      {
        "model": "jdk 1.6.0 34",
        "scope": null,
        "trust": 0.6,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "power express",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ibm",
        "version": "5200"
      },
      {
        "model": "jdk",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "oracle",
        "version": "1.8"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "oracle",
        "version": "1.6.041"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70001.1"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.1"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.0.1"
      },
      {
        "model": "rational doors next generation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.3"
      },
      {
        "model": "power ps702",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.30"
      },
      {
        "model": "powervc standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.0.1"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.039"
      },
      {
        "model": "jdk update17",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.1"
      },
      {
        "model": "security access manager for web",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "tivoli netcool performance manager wireless",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.1"
      },
      {
        "model": "emptoris supplier lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.2.6"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35007.2"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.17"
      },
      {
        "model": "(comware r2122",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "79007)"
      },
      {
        "model": "sparc enterprise m5000 xcp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1118"
      },
      {
        "model": "rational developer for power systems software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.6"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "rational developer for power systems software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.22"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.18"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0.2"
      },
      {
        "model": "system storage ts3310 tape library 640g",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "netiq sentinel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "7.3.4"
      },
      {
        "model": "idataplex dx360 m4 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "79120"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0.1"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.7"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.1"
      },
      {
        "model": "tivoli netcool/omnibus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3.1"
      },
      {
        "model": "security access manager for mobile",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.5"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.2.6"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.0"
      },
      {
        "model": "notes and domino fp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.35"
      },
      {
        "model": "oceanstor vis6600t v200r003c10spc400",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.2"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2"
      },
      {
        "model": "systems director storage control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.1.0"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.6"
      },
      {
        "model": "oceanstor s5500t v200r002c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "operations agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.1"
      },
      {
        "model": "infosphere optim query workload tuner for db2 for luw",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.4"
      },
      {
        "model": "jdk update3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "ei (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "51205)0"
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.14"
      },
      {
        "model": "rational tau",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.35"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.2"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0"
      },
      {
        "model": "sonas",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.2.0"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.2"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70007.5"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0"
      },
      {
        "model": "tivoli monitoring fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.306"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.0.1"
      },
      {
        "model": "db2\u00ae connect? enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.8"
      },
      {
        "model": "db2\u00ae connect? application server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "rational requirements composer ifix1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.16"
      },
      {
        "model": "infosphere optim query workload tuner for db2 for z/os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.9.2"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.2"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.5"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.0.3"
      },
      {
        "model": "infosphere discovery for zos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.5"
      },
      {
        "model": "flex system chassis management module 2pet10k",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.0.1"
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.1"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.0.1"
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.42"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.4.1"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.025"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.3"
      },
      {
        "model": "java se embedded 7u71",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "rational directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1.1"
      },
      {
        "model": "rational automation framework ifix5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.3"
      },
      {
        "model": "powervc standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.2.1"
      },
      {
        "model": "sametime community server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.04"
      },
      {
        "model": "6127xlg",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "0"
      },
      {
        "model": "system m2 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x355041980"
      },
      {
        "model": "power systems 350.c0",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.0.47"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.12"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.1"
      },
      {
        "model": "cloud manager interim fix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.3"
      },
      {
        "model": "content collector for sap applications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0.1"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.12"
      },
      {
        "model": "tivoli netcool performance manager wireless",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4"
      },
      {
        "model": "tivoli monitoring",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.31"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.6.3.1"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.22"
      },
      {
        "model": "tivoli netcool service quality manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.4"
      },
      {
        "model": "rational insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.1"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.17"
      },
      {
        "model": "java sdk sr16-fp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "sterling control center ifix01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.21"
      },
      {
        "model": "systems director storage control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.7.0"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.3"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.7"
      },
      {
        "model": "system networking rackswitch g8124-e",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.9.100"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.02"
      },
      {
        "model": "java sdk sr4-fp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37001.1"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.9.1"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.5"
      },
      {
        "model": "api management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0"
      },
      {
        "model": "system m4 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x310025820"
      },
      {
        "model": "infosphere optim query workload tuner for db2 for z/os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.1"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.9.5"
      },
      {
        "model": "tivoli storage flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.0"
      },
      {
        "model": "algo one",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.8"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.3"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.30"
      },
      {
        "model": "flex system fc3171 8gb san switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "tivoli asset discovery for distributed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.2.0"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.7"
      },
      {
        "model": "data server runtime client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "power systems 350.b1",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tivoli composite application manager for transactions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0"
      },
      {
        "model": "oceanstor v100r001c20spc200",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "18800"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.3"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.0.43"
      },
      {
        "model": "power express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7400"
      },
      {
        "model": "system networking rackswitch g8332",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.7.170"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2"
      },
      {
        "model": "license metric tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.2"
      },
      {
        "model": "z/tpf enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.11"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37007.2"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.8.06"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.4"
      },
      {
        "model": "sterling connect:direct browser user interface ifix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.0.208"
      },
      {
        "model": "tivoli endpoint manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50001.1"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.04"
      },
      {
        "model": "algo one",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.7"
      },
      {
        "model": "sterling connect:express for unix ifix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.6.1146-109"
      },
      {
        "model": "oceanstor s6800t v200r002c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netezza platform software",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.1"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6.0.2"
      },
      {
        "model": "java sdk ga",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8"
      },
      {
        "model": "tivoli common reporting",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.1.2"
      },
      {
        "model": "data server driver package",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "cognos business intelligence server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2.1"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.1"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.3"
      },
      {
        "model": "chrome",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "google",
        "version": "0"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1"
      },
      {
        "model": "flex system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.2"
      },
      {
        "model": "data server client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "rlks administration and reporting tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.4"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2"
      },
      {
        "model": "openpages grc platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.00"
      },
      {
        "model": "notes and domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.1.3"
      },
      {
        "model": "tivoli storage manager operations center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1200"
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.1.1"
      },
      {
        "model": "asset manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.41"
      },
      {
        "model": "tivoli composite application manager for transactions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.1"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.36"
      },
      {
        "model": "infosphere biginsights",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.00"
      },
      {
        "model": "sterling connect:express for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.6"
      },
      {
        "model": "jrockit r28.3.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "tivoli system automation for multiplatforms",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.2"
      },
      {
        "model": "te60 v100r001c10",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "release control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.20"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.043"
      },
      {
        "model": "tivoli network performance manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.1"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.211"
      },
      {
        "model": "netcool/system service monitor fp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.1"
      },
      {
        "model": "bladecenter -s",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8886"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.13.0"
      },
      {
        "model": "commonstore for lotus domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.4"
      },
      {
        "model": "qradar siem mr2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35007.3"
      },
      {
        "model": "websphere real time sr",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "39"
      },
      {
        "model": "smc2.0 v100r002c03",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.0.35"
      },
      {
        "model": "jre update3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.15.0"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.3"
      },
      {
        "model": "security network controller 1.0.3350m",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.7.1"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.1"
      },
      {
        "model": "notes and domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.3.6"
      },
      {
        "model": "sparc enterprise m4000 xcp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1118"
      },
      {
        "model": "endpoint manager for software use analysis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2"
      },
      {
        "model": "tivoli storage manager for virtual environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.0"
      },
      {
        "model": "s9700 v200r007c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.8"
      },
      {
        "model": "sterling connect:enterprise for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.4.4.0"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "db2\u00ae enterprise server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "propel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2.20"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.12"
      },
      {
        "model": "tivoli composite application manager for transactions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3.0.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.0.39"
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.20"
      },
      {
        "model": "abyp-2t-1s-1l-p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.2"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.071"
      },
      {
        "model": "data server driver for odbc and cli",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "350.00"
      },
      {
        "model": "abyp-10g-2sr-2lr-1-p-m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "asset manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.32"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35007.4"
      },
      {
        "model": "smartcloud cost management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.0.2"
      },
      {
        "model": "service manager software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.31"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.3.4"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.3.5"
      },
      {
        "model": "initiate master data service",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "sterling connect:direct browser ifix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.11.03"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.2"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.12"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.4.11"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.2"
      },
      {
        "model": "bladecenter -h",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8852"
      },
      {
        "model": "nextscale nx360 m4 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "54550"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.14"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.22"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.2"
      },
      {
        "model": "oceanstor replicationdirector v100r003c00spc400",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "connect-it",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.40"
      },
      {
        "model": "tivoli network performance manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4"
      },
      {
        "model": "tealeaf customer experience",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.0"
      },
      {
        "model": "websphere dashboard framework",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.1"
      },
      {
        "model": "linux ia-64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "flex system chassis management module 2peo12i",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "security proventia network enterprise scanner",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.3"
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.5.0"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.4"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.1"
      },
      {
        "model": "tivoli common reporting",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.2"
      },
      {
        "model": "jdk(os 1.7.0 45",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "x)"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.08"
      },
      {
        "model": "rational engineering lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.1"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.1"
      },
      {
        "model": "rational developer for i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.1"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.1"
      },
      {
        "model": "openjdk",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "quidway s9300 v200r007sph003",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "db2\u00ae connect? enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.075"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.7"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.71"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.6"
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.2"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.53"
      },
      {
        "model": "flashcopy manager for unix and linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.0"
      },
      {
        "model": "tivoli key lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0"
      },
      {
        "model": "jrockit r28.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.51"
      },
      {
        "model": "operational decision manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6"
      },
      {
        "model": "predictiveinsight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50007.5"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.4.0.5"
      },
      {
        "model": "security privileged identity manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.1.1"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0.3"
      },
      {
        "model": "hsr6800 (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "initiate master data service",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "ds8800",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "86.31.167.0"
      },
      {
        "model": "system type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x3690x571480"
      },
      {
        "model": "rational requirements composer ifix5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.6"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.17"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.16"
      },
      {
        "model": "java sdk sr16-fp9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "abyp-10g-4lr-1-p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "tivoli netcool/omnibus webgui",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.4"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.23"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35007.4.0.5"
      },
      {
        "model": "flex system chassis management module 2pet12f",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1.4"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.1"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.02"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50007.2"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.7"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.3.0.1"
      },
      {
        "model": "rational automation framework",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.2"
      },
      {
        "model": "tivoli storage manager for virtual environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.2.3"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.075"
      },
      {
        "model": "infosphere optim configuration manager for db2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1"
      },
      {
        "model": "control center ifix01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.0.0"
      },
      {
        "model": "system m4 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x375087220"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.3"
      },
      {
        "model": "java sdk 6r1 sr8-fp2",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "sparc enterprise m9000 xcp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1117"
      },
      {
        "model": "cognos business viewpoint fp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "predictiveinsight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.720"
      },
      {
        "model": "pureapplication system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0"
      },
      {
        "model": "bluemix workflow",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.5"
      },
      {
        "model": "cloud manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.1"
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.6.1"
      },
      {
        "model": "db2\u00ae workgroup server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.8"
      },
      {
        "model": "security access manager for web",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.5"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4"
      },
      {
        "model": "data studio client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.3"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "infosphere biginsights",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.23"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "rational reporting for development intelligence",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0.5"
      },
      {
        "model": "emptoris sourcing",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.4"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.2"
      },
      {
        "model": "ds8870",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "87.41.17.0"
      },
      {
        "model": "java sdk sr16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "policy center v100r003c00spc305",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3"
      },
      {
        "model": "power ps700",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.7"
      },
      {
        "model": "infosphere discovery",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.6"
      },
      {
        "model": "system networking rackswitch g8264",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "rational synergy ifix01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.1.3"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.5"
      },
      {
        "model": "flex system chassis management module 2pet12g",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tivoli access manager for e-business",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "model": "oceanstor 18800f v100r001c10",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "security access manager for mobile",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.4"
      },
      {
        "model": "messagesight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.2"
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.4"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.8"
      },
      {
        "model": "rational developer for aix and linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.1"
      },
      {
        "model": "firefox",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mozilla",
        "version": "0"
      },
      {
        "model": "sterling control center ifix02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.10"
      },
      {
        "model": "flex system chassis management module 2pet10a",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "flashcopy manager for oracle",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.0"
      },
      {
        "model": "tivoli directory integrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1"
      },
      {
        "model": "tivoli storage manager operations center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "infosphere optim performance manager for db2 on linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1.1"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "tivoli monitoring fp6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.30"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.44"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.5"
      },
      {
        "model": "algo one",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.9.1"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.3"
      },
      {
        "model": "storwize unified",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70001.5"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "flex system chassis management module 2peo12e",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.0.2"
      },
      {
        "model": "jrockit r28.1.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.0"
      },
      {
        "model": "smc2.0 v100r002c01",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smartcloud cost management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.0.3"
      },
      {
        "model": "security access manager for mobile",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.1"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0.0"
      },
      {
        "model": "notes and domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.2.4"
      },
      {
        "model": "java sdk sr7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7"
      },
      {
        "model": "power express f/c",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "52056340"
      },
      {
        "model": "oceanstor s5600t v200r002c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.40"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.7.2"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.038"
      },
      {
        "model": "flashsystem 9840-ae2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "840"
      },
      {
        "model": "rational engineering lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.6"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3"
      },
      {
        "model": "db2\u00ae connect? application server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "rational engineering lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.5"
      },
      {
        "model": "abyp-10g-4sr-1-p-m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "flex system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.0.0"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.74"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "p6000 command view software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.3.4"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5"
      },
      {
        "model": "ediscovery identification and collection",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.1"
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.3"
      },
      {
        "model": "jrockit r28.2.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.3.1"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.1"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.31"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.3"
      },
      {
        "model": "java se embedded 8u33",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "db2\u00ae connect? unlimited edition for system i\u00ae",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.03"
      },
      {
        "model": "toolscenter suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.51"
      },
      {
        "model": "java sdk sr16-fp6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.5"
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.1.0"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.411"
      },
      {
        "model": "java sdk sr12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6"
      },
      {
        "model": "java sdk",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6"
      },
      {
        "model": "netiq sentinel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "7.4.1"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50007.4.0.5"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.213"
      },
      {
        "model": "qradar siem mr2 patch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.18"
      },
      {
        "model": "tape subsystems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "openpages grc platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.0.0"
      },
      {
        "model": "system idataplex dx360 m2 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x73210"
      },
      {
        "model": "image construction and composition tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.1.3"
      },
      {
        "model": "emptoris supplier lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.23"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.713"
      },
      {
        "model": "powervc standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.1.0"
      },
      {
        "model": "rational developer for system z if3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.15"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.1"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.11"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.1.0"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.4.7"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.42"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.4"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.0.1"
      },
      {
        "model": "enterprise linux server supplementary",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "sterling connect:direct browser",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.3"
      },
      {
        "model": "rational developer for i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.01"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.2"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.51"
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.1.2"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "350.60"
      },
      {
        "model": "oceanstor s5800t v200r002c20",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cognos planning",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1.1"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.28"
      },
      {
        "model": "system networking rackswitch g8264-t",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.9.13.0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35007.2.0.5"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35006.1"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.6.3"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37007.3.0.12"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0.1"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.6"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.4.1"
      },
      {
        "model": "rational engineering lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0"
      },
      {
        "model": "flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.1.1"
      },
      {
        "model": "operations manager for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "8.16"
      },
      {
        "model": "sterling connect:express for unix ifix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.6.1146-108"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.0"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.071"
      },
      {
        "model": "aura system platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0.3.9.3"
      },
      {
        "model": "p6000 command view software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.3.5"
      },
      {
        "model": "tivoli network manager ip edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.8"
      },
      {
        "model": "websphere partner gateway advanced edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.1.3"
      },
      {
        "model": "smartcloud entry appliance fp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.4"
      },
      {
        "model": "lotus notes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.2"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.3"
      },
      {
        "model": "netiq sentinel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "7.3.2"
      },
      {
        "model": "tivoli system automation for multiplatforms",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1"
      },
      {
        "model": "oceanstor s5800t v200r002c10",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "e9000 chassis v100r001c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.4.2"
      },
      {
        "model": "flashcopy manager for db2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.0"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.1"
      },
      {
        "model": "power",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7800"
      },
      {
        "model": "si (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "51205)0"
      },
      {
        "model": "flashcopy manager for db2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1.2"
      },
      {
        "model": "tivoli storage manager for virtual environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.0"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.12"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0.2"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.7.1"
      },
      {
        "model": "emptoris sourcing",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.1.0"
      },
      {
        "model": "enterprise linux workstation supplementary",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "db2\u00ae advanced workgroup server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.0.4"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.13.2"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.1.3"
      },
      {
        "model": "system m4 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x325025830"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.9"
      },
      {
        "model": "jdk update2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "rational software architect ifix1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.5"
      },
      {
        "model": "p6000 command view software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.3.2"
      },
      {
        "model": "infosphere master data management standard/advanced edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "11.3"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.2"
      },
      {
        "model": "cloud manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.3"
      },
      {
        "model": "jrockit r28.3.6",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0"
      },
      {
        "model": "system networking rackswitch g8124-e",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.32"
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.2.1"
      },
      {
        "model": "operational decision manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "rational directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1.2"
      },
      {
        "model": "smartcloud orchestrator fp1 ifix5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.3"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.3"
      },
      {
        "model": "smartcloud entry fp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.110"
      },
      {
        "model": "rational build utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5.0.2"
      },
      {
        "model": "system m2 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x365079470"
      },
      {
        "model": "power express f/c",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "52056330"
      },
      {
        "model": "layer gbesm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2/30"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.16"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.32"
      },
      {
        "model": "bladecenter js43 with feature code",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "(7778-23x8446)0"
      },
      {
        "model": "f1000-a-ei (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "powervc express edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.11"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.2"
      },
      {
        "model": "transactionvision",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.0"
      },
      {
        "model": "rational developer for aix and linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.01"
      },
      {
        "model": "system storage ts2900 tape library",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0026"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.032"
      },
      {
        "model": "powervc express edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.0.2"
      },
      {
        "model": "websphere service registry and repository",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "systems director storage control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.6.0"
      },
      {
        "model": "rational insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1"
      },
      {
        "model": "oceanstor v100r001c30",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "18800"
      },
      {
        "model": "rational requirements composer ifix4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.6"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.0"
      },
      {
        "model": "db2\u00ae connect? unlimited edition for system i\u00ae",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "flex system chassis management module 2pet12h",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "pureapplication system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.4"
      },
      {
        "model": "(comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "125005)0"
      },
      {
        "model": "oceanstor cse v100r002",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "tivoli netcool configuration manager",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.4.1.3"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.0.12"
      },
      {
        "model": "system m4 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x363071580"
      },
      {
        "model": "sparc enterprise m5000 xcp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1121"
      },
      {
        "model": "rational tau interim fix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.0.6"
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.6"
      },
      {
        "model": "api management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0"
      },
      {
        "model": "jre update2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "msr (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "30-1x5)0"
      },
      {
        "model": "asset manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.30"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.4"
      },
      {
        "model": "jre update15",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.14.0"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.0.1"
      },
      {
        "model": "flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1.0"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.0.590"
      },
      {
        "model": "tivoli storage manager for virtual environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.4.2.0"
      },
      {
        "model": "db2 express edition fp11",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "tivoli business service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.1"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.1"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1"
      },
      {
        "model": "initiate master data service provider hub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "linux enterprise server sp4 ltss",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "10"
      },
      {
        "model": "tivoli system automation application manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.1"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.3"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.4.1"
      },
      {
        "model": "oceanstor v100r001c10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "18500"
      },
      {
        "model": "oceanstor vis6600t v200r003c10spc100",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "sdk for node.js",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.5"
      },
      {
        "model": "sterling connect:direct for openvms",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.5"
      },
      {
        "model": "flex system compute node type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x24078630"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.13"
      },
      {
        "model": "aura system platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0.2"
      },
      {
        "model": "infosphere biginsights",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0"
      },
      {
        "model": "content manager enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0.2"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.3"
      },
      {
        "model": "linux s/390",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.2"
      },
      {
        "model": "db2 advanced workgroup server edition fp11",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0"
      },
      {
        "model": "bladecenter js12 express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "(7998-60x)0"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "tivoli storage manager operations center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1100"
      },
      {
        "model": "rational reporting for development intelligence",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0.4"
      },
      {
        "model": "netiq sentinel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "7.4.3"
      },
      {
        "model": "bladecenter -t",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8730"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50007.4"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.7"
      },
      {
        "model": "system storage ts3310 tape library 636g",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "business process monitor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.24"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.6"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.9.0"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2"
      },
      {
        "model": "flex system manager node types",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "87310"
      },
      {
        "model": "abyp-0t-0s-4l-p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.1.5"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.21"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.31"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.14"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.13"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.70"
      },
      {
        "model": "flashsystem 9840-ae1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "840"
      },
      {
        "model": "powervc standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.0.3"
      },
      {
        "model": "business process insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.0"
      },
      {
        "model": "rational developer for i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "websphere service registry and repository studio",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "algo one",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "java sdk sr fp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7910"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.8.1"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.11.0"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "350.20"
      },
      {
        "model": "smartcloud entry appliance fp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.4.0.5"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.4.01"
      },
      {
        "model": "1/10gb uplink ethernet switch module",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.4.10.0"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.5"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.3.0"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.13"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.2"
      },
      {
        "model": "tivoli system automation for multiplatforms",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.13"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.2"
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.2"
      },
      {
        "model": "maximo asset management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.6"
      },
      {
        "model": "infosphere data architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.03"
      },
      {
        "model": "jrockit r28.3.3",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "db2\u00ae connect? unlimited edition for system z\u00ae",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6.0.1"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.15"
      },
      {
        "model": "sterling connect:direct browser",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4"
      },
      {
        "model": "flex system chassis management module 2pet12i",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "system m4 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x375087180"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.2"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.045"
      },
      {
        "model": "jre update10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "bsm connector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.22"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.7.0.1"
      },
      {
        "model": "rational developer for power systems software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "sterling connect:direct for openvms",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.6"
      },
      {
        "model": "sterling connect:direct browser user interface",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.52"
      },
      {
        "model": "idataplex dx360 m4 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "79130"
      },
      {
        "model": "jdk update6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "flex system fc3171 8gb san switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.0.37"
      },
      {
        "model": "jre update7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.01"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.01"
      },
      {
        "model": "jdk update10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "flex system chassis management module 2pet10m",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "oceanstor 18800f v100r001c30",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rational doors next generation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.1"
      },
      {
        "model": "infosphere optim data masking solution",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "11.3.0.3"
      },
      {
        "model": "java sdk sr16-fp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "bsm connector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.23"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.0.4"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50007.1"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.0.9"
      },
      {
        "model": "system idataplex dx360 m2 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x73230"
      },
      {
        "model": "enterprise linux server supplementary eus 6.6.z",
        "scope": null,
        "trust": 0.3,
        "vendor": "redhat",
        "version": null
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.3"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.0.0"
      },
      {
        "model": "enterprise linux desktop supplementary",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "jre update13",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "infosphere optim performance manager for db2 on windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1.1"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.1"
      },
      {
        "model": "release control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.13"
      },
      {
        "model": "security appscan standard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.1"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.2"
      },
      {
        "model": "db2\u00ae advanced workgroup server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "optim performance manager for db2 on linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.15"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.6"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3.0.3"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.0.5"
      },
      {
        "model": "websphere partner gateway enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.1.3"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.3"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37007.3"
      },
      {
        "model": "cognos controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2.1"
      },
      {
        "model": "jrockit r27.8.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.1.1"
      },
      {
        "model": "tivoli storage manager operations center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.4100"
      },
      {
        "model": "db2 workgroup server edition fp11",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "tivoli composite application manager for soa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2"
      },
      {
        "model": "flashsystem 9848-ae1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "840"
      },
      {
        "model": "db2 query management facility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "connect-it",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.50"
      },
      {
        "model": "sdk for node.js",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.2"
      },
      {
        "model": "java sdk sr5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7"
      },
      {
        "model": "rational developer for aix and linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "bladecenter -h",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1886"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.00"
      },
      {
        "model": "gbesm 1g l2/7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.1"
      },
      {
        "model": "sparc enterprise m4000 xcp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1121"
      },
      {
        "model": "notes and domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.3"
      },
      {
        "model": "(comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "125007)0"
      },
      {
        "model": "jre(os 1.7.0 45",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "x)"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35001.1"
      },
      {
        "model": "security access manager for mobile",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.5.0"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.6"
      },
      {
        "model": "integration toolkit",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.7"
      },
      {
        "model": "db2\u00ae connect? enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "0"
      },
      {
        "model": "hp-ux web server suite hpuxwsatw405",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "4.05"
      },
      {
        "model": "system storage ts2900 tape library",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0025"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "flashsystem 9846-ac1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v840"
      },
      {
        "model": "power",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5950"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.1"
      },
      {
        "model": "cognos controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "jdk update25",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.0.3"
      },
      {
        "model": "cognos business intelligence server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2"
      },
      {
        "model": "tivoli storage flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.0"
      },
      {
        "model": "emptoris spend analysis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.4"
      },
      {
        "model": "business process monitor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.10"
      },
      {
        "model": "control center ifix02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.0.0"
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "0"
      },
      {
        "model": "systems director storage control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.2.1"
      },
      {
        "model": "cognos command center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2.1"
      },
      {
        "model": "enterprise linux hpc node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "flashcopy manager for custom applications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.1"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50007.3.0.12"
      },
      {
        "model": "i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2"
      },
      {
        "model": "security identity governance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "(comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "58305)0"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.3"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2"
      },
      {
        "model": "flex system chassis management module 2pet10b",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "systems director storage control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.3.0"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.2.5"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37006.3"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.5"
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.43"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.73"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.24"
      },
      {
        "model": "tivoli common reporting",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.2"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "5"
      },
      {
        "model": "tivoli business service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "model": "security network controller 1.0.3376m",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "jdk update15",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "power express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "550"
      },
      {
        "model": "(comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "75005)0"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.2.195"
      },
      {
        "model": "predictiveinsight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2"
      },
      {
        "model": "e6000 chassis v100r001c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netiq sentinel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "7.3"
      },
      {
        "model": "power express f/c",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5504965"
      },
      {
        "model": "cognos command center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2"
      },
      {
        "model": "tivoli provisioning manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "sparc enterprise m8000 xcp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1118"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.0.2"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.027"
      },
      {
        "model": "northstar controller application",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "2.1.0"
      },
      {
        "model": "db2\u00ae connect? application server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.8"
      },
      {
        "model": "power",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7700"
      },
      {
        "model": "msr4000 (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7)0"
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.0.0"
      },
      {
        "model": "(comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "58005)0"
      },
      {
        "model": "db2 enterprise server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "rational reporting for development intelligence",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0.1"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.3"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "350.70"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0.0"
      },
      {
        "model": "system type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x3850x571460"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.3.0"
      },
      {
        "model": "rational doors next generation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.6"
      },
      {
        "model": "system storage ts3400 tape library",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0039"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.8"
      },
      {
        "model": "oceanstor s6800t v200r002c20spc200",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50007.1.0.6"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.025"
      },
      {
        "model": "flex system compute node type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x44079170"
      },
      {
        "model": "db2 connect unlimited edition for system z fp6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.8.05"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.0"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.4"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.1.3"
      },
      {
        "model": "rational doors next generation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.5"
      },
      {
        "model": "oceanstor v100r001c00",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "18500"
      },
      {
        "model": "s9700 v200r07sph003",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.7.4.1"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0.1"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37007.5"
      },
      {
        "model": "initiate master data service",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1"
      },
      {
        "model": "rational agent controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.3.3"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.18"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.1"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.0"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.25"
      },
      {
        "model": "sparc enterprise m3000 xcp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1118"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.1"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.4"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.10"
      },
      {
        "model": "websphere mq internet pass-thru",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.1"
      },
      {
        "model": "u200a and m (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.1"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.12"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.4"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.1.0"
      },
      {
        "model": "db2\u00ae connect? unlimited edition for system z\u00ae",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "power express f/c",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5205635"
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5.21"
      },
      {
        "model": "netezza platform software",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "tivoli storage manager administration center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.0.1"
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.4"
      },
      {
        "model": "infosphere guardium",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.211"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.2"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.2"
      },
      {
        "model": "db2 advanced enterprise server edition fp6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3.0.1"
      },
      {
        "model": "websphere mq mqipt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.6"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.033"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.3"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.01"
      },
      {
        "model": "jrockit r27.6.0-50",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.5.015"
      },
      {
        "model": "flashcopy manager for db2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.0"
      },
      {
        "model": "mq light",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.0.1"
      },
      {
        "model": "db2\u00ae express edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "emptoris spend analysis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.01"
      },
      {
        "model": "system networking rackswitch g8000",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.70"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.7"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.1"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.4.0"
      },
      {
        "model": "abyp-4tl-p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "db2\u00ae connect? unlimited edition for system i\u00ae",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.43"
      },
      {
        "model": "sterling connect:direct browser user interface",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4"
      },
      {
        "model": "security network controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.1209"
      },
      {
        "model": "jrockit r27.8.3",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.11"
      },
      {
        "model": "rational doors next generation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.1"
      },
      {
        "model": "system networking rackswitch g8332",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "netinsight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6.0"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.0.1"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "smartcloud provisioning ifix6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.3.0.1"
      },
      {
        "model": "optim performance manager for db2 on windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.1"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.8"
      },
      {
        "model": "hsr6602 (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37006.4.19"
      },
      {
        "model": "power",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7550"
      },
      {
        "model": "rational sap connector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.2"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "model": "security network controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.3361"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.2"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.6.2"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.0"
      },
      {
        "model": "operations manager for linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.10"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.31"
      },
      {
        "model": "mashup center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0"
      },
      {
        "model": "flashcopy manager for unix and linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.0"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0"
      },
      {
        "model": "emptoris spend analysis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.1.1"
      },
      {
        "model": "jrockit r27.7.3",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0.1"
      },
      {
        "model": "initiate master data service",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.2"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.0.1"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.3"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.2"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.24"
      },
      {
        "model": "jdk update9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "jrockit r27.6.5",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "workflow for bluemix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "websphere portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.043"
      },
      {
        "model": "java se embedded 7u60",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "data server driver for odbc and cli",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "aura system platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0"
      },
      {
        "model": "tivoli storage manager operations center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1000"
      },
      {
        "model": "flex system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.4.0"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.060"
      },
      {
        "model": "sterling connect:direct browser user interface",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.411"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1"
      },
      {
        "model": "rational automation framework",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.3"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.4"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1"
      },
      {
        "model": "bsm connector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.20"
      },
      {
        "model": "infosphere optim performance manager for db2 on windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "notes and domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.6.0"
      },
      {
        "model": "cognos tm1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5.2"
      },
      {
        "model": "security appscan source",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6.0.2"
      },
      {
        "model": "websphere portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.1"
      },
      {
        "model": "java sdk sr14",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6.0.2"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.6"
      },
      {
        "model": "oceanstor replicationdirector v100r003c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "(comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "59307)0"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.1"
      },
      {
        "model": "spectrum scale",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.0.4"
      },
      {
        "model": "db2\u00ae enterprise server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.8"
      },
      {
        "model": "linux enterprise server sp2 ltss",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "rlks administration and reporting tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.4.7"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.5"
      },
      {
        "model": "infosphere optim performance manager for db2 on unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1"
      },
      {
        "model": "msr3000 (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7)0"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.2.199"
      },
      {
        "model": "tivoli network performance manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.2"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "flex system compute node type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x24087380"
      },
      {
        "model": "rational engineering lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.2"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.41"
      },
      {
        "model": "aura system platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.10"
      },
      {
        "model": "websphere process server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.2"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.3"
      },
      {
        "model": "workload deployer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1"
      },
      {
        "model": "websphere partner gateway advanced edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.3"
      },
      {
        "model": "jre update4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.2"
      },
      {
        "model": "db2 connect unlimited edition for system z fp11",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.0.4"
      },
      {
        "model": "aura system platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0.3.0.3"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.35"
      },
      {
        "model": "system storage ts2900 tape librray",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0037"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.5.0"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.1.3"
      },
      {
        "model": "tivoli netcool impact",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.1"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.75"
      },
      {
        "model": "lotus expeditor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.2"
      },
      {
        "model": "6125xlg",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "0"
      },
      {
        "model": "netcool/system service monitor fp1 p14",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0-"
      },
      {
        "model": "powervc standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.2"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.11"
      },
      {
        "model": "oceanstor 18800f v100r001c20spc200",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "tivoli monitoring for virtual environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2"
      },
      {
        "model": "cognos business intelligence server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.4.1"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0"
      },
      {
        "model": "flashsystem",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9000"
      },
      {
        "model": "oceanstor v100r001c10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "18800"
      },
      {
        "model": "websphere integration developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.5"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0"
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "websphere service registry and repository",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.5"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.1.4"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.14"
      },
      {
        "model": "abyp-2t-1s-1l-p-m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "content manager enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0.1"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.11"
      },
      {
        "model": "rational sap connector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.7"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50007.2.0.3"
      },
      {
        "model": "rational tau",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.36"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.1"
      },
      {
        "model": "sametime",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.2.1"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.1"
      },
      {
        "model": "infosphere master data management standard/advanced edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "11.0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37007.2.0.3"
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.3"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.1"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.7.3"
      },
      {
        "model": "megaraid storage manager",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "15.05.01.51"
      },
      {
        "model": "security access manager for web",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.03"
      },
      {
        "model": "infosphere optim configuration manager for db2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.1"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.2"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35006.4.1.8"
      },
      {
        "model": "content manager enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3"
      },
      {
        "model": "(comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "75007)0"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1"
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.1"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.2"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.051"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.213"
      },
      {
        "model": "oceanstor s2600t v200r002c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "endpoint manager for remote control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50006.4"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.6"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.6"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.4"
      },
      {
        "model": "rational tau",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.34"
      },
      {
        "model": "tivoli monitoring fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.29"
      },
      {
        "model": "enterprise linux desktop supplementary",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "java sdk",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3.0"
      },
      {
        "model": "websphere message broker toolkit",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.15"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.1"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "(comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "105007)0"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.195"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.034"
      },
      {
        "model": "java sdk sr16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6"
      },
      {
        "model": "power express f/c",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5205577"
      },
      {
        "model": "data server driver for odbc and cli",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2"
      },
      {
        "model": "jrockit r28.3.2",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.01"
      },
      {
        "model": "security appscan standard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.3"
      },
      {
        "model": "abyp-2t-2s-0l-p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.6"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0.1"
      },
      {
        "model": "cognos insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.3.2"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2"
      },
      {
        "model": "flex system chassis management module 2pet12r",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.7"
      },
      {
        "model": "rational insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.1.4"
      },
      {
        "model": "web experience factory",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.13"
      },
      {
        "model": "smartcloud provisioning",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.51"
      },
      {
        "model": "cognos business intelligence server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2.11"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.4.2"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.4"
      },
      {
        "model": "operations analytics predictive insights",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.1"
      },
      {
        "model": "infosphere global name management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.2"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50007.2.0.8"
      },
      {
        "model": "abyp-0t-4s-0l-p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37007.4"
      },
      {
        "model": "emptoris supplier lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.4"
      },
      {
        "model": "netiq sentinel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "7.4"
      },
      {
        "model": "systems director storage control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.4.1"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "runtimes for java technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.2"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.15"
      },
      {
        "model": "network advisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "infosphere optim performance manager for db2 on unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.3.1"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.2.184"
      },
      {
        "model": "spectrum scale",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.0.3"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.1"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37007.1.0.6"
      },
      {
        "model": "tivoli system automation for multiplatforms",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2"
      },
      {
        "model": "operations agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.20"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.4"
      },
      {
        "model": "enterprise linux workstation supplementary",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "tivoli storage manager for virtual environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.1"
      },
      {
        "model": "flex system fc3171 8gb san switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.3"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.1"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.1.1"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.13.0"
      },
      {
        "model": "release control software p3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.21"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.4"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.2"
      },
      {
        "model": "storwize unified",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70001.3"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.038"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.35"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.07"
      },
      {
        "model": "optim performance manager for db2 on unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1"
      },
      {
        "model": "dataquant",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.2"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.8"
      },
      {
        "model": "websphere service registry and repository studio",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3"
      },
      {
        "model": "system m4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x35507914"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3"
      },
      {
        "model": "rational engineering lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.4"
      },
      {
        "model": "tivoli monitoring",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3"
      },
      {
        "model": "system m3 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x350073800"
      },
      {
        "model": "sterling connect:direct browser",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.11"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "jdk update7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "predictiveinsight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.2.3"
      },
      {
        "model": "flex system chassis management module 2pet10c",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "operations manager for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.10"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.9"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3.0"
      },
      {
        "model": "infosphere data architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "rational synergy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.6"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.38"
      },
      {
        "model": "db2\u00ae enterprise server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "system networking rackswitch g8264-t",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.9.100"
      },
      {
        "model": "jre update11",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.0.0"
      },
      {
        "model": "pureapplication system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.5"
      },
      {
        "model": "power systems 350.b0",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "infosphere data replication dashboard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2.1"
      },
      {
        "model": "service manager software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.35"
      },
      {
        "model": "smb1920 (comware r1106",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)"
      },
      {
        "model": "system idataplex dx360 m3 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x63910"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.12"
      },
      {
        "model": "emptoris strategic supply management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.22"
      },
      {
        "model": "qradar siem patch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.41"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.2"
      },
      {
        "model": "websphere message broker",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.5"
      },
      {
        "model": "flashcopy manager for oracle with sap environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.4"
      },
      {
        "model": "jrockit r27.7.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.1.6"
      },
      {
        "model": "jre update17",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "optim performance manager for db2 on unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.1"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.32"
      },
      {
        "model": "tivoli monitoring fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.303"
      },
      {
        "model": "sterling connect:express for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.0.12"
      },
      {
        "model": "enterprise linux server supplementary",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "(comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "59007)0"
      },
      {
        "model": "security access manager for mobile",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.2"
      },
      {
        "model": "flex system compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x2202585"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.16.2"
      },
      {
        "model": "hp-ux apache-based web server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2.2.15.21"
      },
      {
        "model": "infosphere data replication dashboard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.4.0"
      },
      {
        "model": "powervc standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.11"
      },
      {
        "model": "bladecenter -s",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7779"
      },
      {
        "model": "flex system compute node type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x88079030"
      },
      {
        "model": "tivoli netcool impact",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.6.2"
      },
      {
        "model": "emptoris spend analysis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0"
      },
      {
        "model": "tivoli asset discovery for distributed",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "msr (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9xx5)0"
      },
      {
        "model": "powervc standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.0.2"
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.5"
      },
      {
        "model": "runtimes for java technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "linux mips",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.1"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.19"
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.7"
      },
      {
        "model": "moonshot",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "0"
      },
      {
        "model": "e9000 chassis v100r001c00spc230",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "infosphere guardium",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "u200s and cs (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "smartcloud orchestrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.3"
      },
      {
        "model": "flashsystem 9848-ac1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v840"
      },
      {
        "model": "emptoris services procurement",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.25"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.6.1"
      },
      {
        "model": "abyp-2t-0s-2l-p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.21"
      },
      {
        "model": "cognos tm1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2.2"
      },
      {
        "model": "toolscenter suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.50"
      },
      {
        "model": "enterprise linux workstation supplementary",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.12.0"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "350.80"
      },
      {
        "model": "powervc express edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.0.4"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1.0"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.16"
      },
      {
        "model": "rational tau interim fix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.0.6"
      },
      {
        "model": "sterling control center ifix03",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.41"
      },
      {
        "model": "virtual fabric 10gb switch module",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.8.6.0"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.14"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "oceanstor v100r001c00",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "18800"
      },
      {
        "model": "operations manager for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.0"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.0.1"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0.0.3"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.3"
      },
      {
        "model": "tealeaf customer experience",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.4"
      },
      {
        "model": "flashsystem 9846-ae1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v840"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1"
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.1.0"
      },
      {
        "model": "websphere appliance management center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "security key lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.0.1"
      },
      {
        "model": "flex system compute node type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x22279160"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.4.3"
      },
      {
        "model": "power express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7100"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.071"
      },
      {
        "model": "pureapplication system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0"
      },
      {
        "model": "service manager software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.32"
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5.11"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.4.12"
      },
      {
        "model": "data server runtime client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "tivoli directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0"
      },
      {
        "model": "9500e (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.0.3"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.22"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.1.1"
      },
      {
        "model": "aura system platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0.3.8.3"
      },
      {
        "model": "msr20 (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.5"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.2.1"
      },
      {
        "model": "tivoli monitoring",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.2"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.2"
      },
      {
        "model": "os image for aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0.0.1"
      },
      {
        "model": "security proventia network multi-function security system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.6"
      },
      {
        "model": "domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "flex system chassis management module 2pet10q",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "cognos business intelligence server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2.2"
      },
      {
        "model": "operations manager for linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.21"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.4"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.032"
      },
      {
        "model": "infosphere discovery for zos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.6"
      },
      {
        "model": "cognos controller fp1 if1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2.1"
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.45"
      },
      {
        "model": "infosphere optim query workload tuner for db2 for z/os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "system networking rackswitch g8264",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.8.1.0"
      },
      {
        "model": "security privileged identity manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0"
      },
      {
        "model": "db2\u00ae connect? unlimited edition for system i\u00ae",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.8"
      },
      {
        "model": "bladecenter js22",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "(7998-61x)0"
      },
      {
        "model": "tivoli directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.35"
      },
      {
        "model": "websphere mq",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.4"
      },
      {
        "model": "security access manager for web",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.0"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.4"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.03"
      },
      {
        "model": "jrockit r28.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "websphere integration developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.0"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0"
      },
      {
        "model": "hp830 (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "rational developer for aix and cobol",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.1"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.21"
      },
      {
        "model": "multi-enterprise integration gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.0.1"
      },
      {
        "model": "lotus notes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.3"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.43"
      },
      {
        "model": "msr (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "93x5)0"
      },
      {
        "model": "sparc enterprise m8000 xcp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1121"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.7"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.1"
      },
      {
        "model": "java jre 1.6.0 37",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "abyp-0t-4s-0l-p-m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "system m3 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x355079440"
      },
      {
        "model": "bladecenter js23",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "(7778-23x)0"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.32"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.012"
      },
      {
        "model": "4800g (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.2.0"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.8"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1"
      },
      {
        "model": "power hmc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.0.0"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.7"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.1"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.52"
      },
      {
        "model": "tivoli directory integrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0"
      },
      {
        "model": "websphere service registry and repository",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "cloud manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1"
      },
      {
        "model": "tivoli network manager ip edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1"
      },
      {
        "model": "tivoli netcool/omnibus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35006.4"
      },
      {
        "model": "sterling connect:direct browser",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.2"
      },
      {
        "model": "sonas",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.1.3"
      },
      {
        "model": "aura system platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.2.1"
      },
      {
        "model": "netiq sentinel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "7.3.3"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.3"
      },
      {
        "model": "system type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x3850x571430"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.210"
      },
      {
        "model": "tivoli storage manager operations center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.4"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.22"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.14.0"
      },
      {
        "model": "smartcloud provisioning fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.15"
      },
      {
        "model": "powervc express edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.1.2"
      },
      {
        "model": "rational sap connector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.1"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "rational doors next generation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.2"
      },
      {
        "model": "algo credit limits",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.7.0"
      },
      {
        "model": "asset manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.40"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "java se embedded 8u6",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.5"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.72"
      },
      {
        "model": "xiv management tools",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.5"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.14"
      },
      {
        "model": "smartcloud entry appliance fp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.3.0.3"
      },
      {
        "model": "notes and domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.19"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.0"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.3.2"
      },
      {
        "model": "sdk for node.js",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.13"
      },
      {
        "model": "data server driver for odbc and cli",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.37"
      },
      {
        "model": "tivoli netcool impact",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1"
      },
      {
        "model": "rational reporting for development intelligence",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.31"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.045"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.2"
      },
      {
        "model": "tivoli common reporting",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35007.3.0.5"
      },
      {
        "model": "jrockit r27.6.7",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "java sdk sr16-fp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6"
      },
      {
        "model": "data server runtime client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "sametime community server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.2"
      },
      {
        "model": "tivoli monitoring fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.303"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.20"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.4"
      },
      {
        "model": "content collector for sap applications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2"
      },
      {
        "model": "infosphere data replication dashboard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "11.3"
      },
      {
        "model": "jrockit r27.6.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.5"
      },
      {
        "model": "powervc express edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.0.0"
      },
      {
        "model": "system m4 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x375087330"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.4"
      },
      {
        "model": "smartcloud entry appliance fp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.4"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "350.90"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.2"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.024"
      },
      {
        "model": "flex system chassis management module 2pet12k",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0"
      },
      {
        "model": "service manager software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.34"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0"
      },
      {
        "model": "db2\u00ae advanced workgroup server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.8"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35007.2.0.3"
      },
      {
        "model": "rational engineering lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.0.1"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.1"
      },
      {
        "model": "emptoris spend analysis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.20"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.23"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50007.1.0.7"
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.00"
      },
      {
        "model": "db2\u00ae purescale? feature for enterprise server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.8"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.02"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.71"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.1"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.10"
      },
      {
        "model": "propel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "1.01"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.16.1"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.3"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.11"
      },
      {
        "model": "release control 9.21p2",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3.0.0"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.029"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1"
      },
      {
        "model": "flashcopy manager for unix and linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.4"
      },
      {
        "model": "websphere real time",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.2143"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.1"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "s7700 v200r003c00spc600",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "abyp-10g-2sr-2lr-1-p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.5"
      },
      {
        "model": "cognos planning",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0"
      },
      {
        "model": "power hmc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.0.0"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.0.1"
      },
      {
        "model": "db2 enterprise server edition fp6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "java sdk 7r1 sr2",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "system m5 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x310054570"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.13"
      },
      {
        "model": "integration adaptor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.12"
      },
      {
        "model": "systems director storage control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.4.0"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.8"
      },
      {
        "model": "flashcopy manager for db2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.0"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.9"
      },
      {
        "model": "websphere process server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.5"
      },
      {
        "model": "tivoli monitoring",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.23"
      },
      {
        "model": "infosphere biginsights",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.2"
      },
      {
        "model": "rational reporting for development intelligence",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0.6"
      },
      {
        "model": "system m3 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x363073770"
      },
      {
        "model": "security access manager for mobile",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.0"
      },
      {
        "model": "cics transaction gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37006.4"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.6"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1.1"
      },
      {
        "model": "security network controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.3376"
      },
      {
        "model": "initiate master data service",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "flex system chassis management module 2pet10p",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "operations agent virtual appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.14"
      },
      {
        "model": "jrockit r28.3.4",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "operations manager for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.21"
      },
      {
        "model": "linux enterprise module for legacy software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "12"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.3"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.11"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.2"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.23"
      },
      {
        "model": "infosphere identity insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1.8"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.21"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.3.6"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.2"
      },
      {
        "model": "flex system chassis management module 2pet12d",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.1"
      },
      {
        "model": "web experience factory",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "tivoli netcool configuration manager if",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.0.6003"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.010"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.41"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.027"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.3"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.022"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.12"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.4"
      },
      {
        "model": "sterling connect:direct browser ifix10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.2"
      },
      {
        "model": "policy center v100r003c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor vis6600t v200r003c10",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "security appscan standard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.2"
      },
      {
        "model": "power systems 350.d0",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "data studio client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "flex system chassis management module 2peo12r",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "rational synergy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.2"
      },
      {
        "model": "rational doors next generation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "sterling connect:direct for microsoft windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.6.0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70007.2.0.5"
      },
      {
        "model": "system networking rackswitch g8264-t",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "oceanstor s5600t v200r002c20spc200",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "system type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x3950x638370"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.12"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.1"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5"
      },
      {
        "model": "sametime",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.2.0"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.212"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.79"
      },
      {
        "model": "websphere portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "emptoris sourcing",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.1.1"
      },
      {
        "model": "rational agent controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "sparc enterprise m4000 xcp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1117"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1"
      },
      {
        "model": "runtimes for java technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0"
      },
      {
        "model": "tivoli system automation application manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.2"
      },
      {
        "model": "sterling control center ifix04",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.2.1"
      },
      {
        "model": "notes and domino fp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.36"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.11"
      },
      {
        "model": "websphere service registry and repository",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "tivoli composite application manager for transactions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3.0"
      },
      {
        "model": "enterprise linux hpc node supplementary",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux desktop supplementary client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "5"
      },
      {
        "model": "java sdk sr16-fp8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "system m3 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x365054540"
      },
      {
        "model": "db2\u00ae workgroup server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35006.3"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35007.1.0.7"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.12"
      },
      {
        "model": "pureapplication system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.13"
      },
      {
        "model": "virtualization performance viewer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2.0"
      },
      {
        "model": "websphere real time sr fp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3810"
      },
      {
        "model": "aura system platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0.1"
      },
      {
        "model": "infosphere optim configuration manager for db2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.1"
      },
      {
        "model": "security appscan standard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.2.1"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.2.191"
      },
      {
        "model": "rational developer for aix and cobol",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "db2\u00ae connect? unlimited edition for system z\u00ae",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.8"
      },
      {
        "model": "db2\u00ae advanced enterprise server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.33"
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.12"
      },
      {
        "model": "rational directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1"
      },
      {
        "model": "sdk for node.js",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.12"
      },
      {
        "model": "sterling connect:direct browser ifix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.0.212"
      },
      {
        "model": "rational directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.0.1"
      },
      {
        "model": "infosphere optim performance manager for db2 on unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "hp870 (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "tivoli common reporting",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.1"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.033"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.13"
      },
      {
        "model": "rational tau",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3"
      },
      {
        "model": "service manager software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.30"
      },
      {
        "model": "linux ia-32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.4"
      },
      {
        "model": "cognos insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2.2"
      },
      {
        "model": "smb (comware r1105",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "16205)"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.8.2"
      },
      {
        "model": "oceanstor v100r001c01spc210",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "9000"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.2"
      },
      {
        "model": "db2\u00ae enterprise server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "system networking rackswitch g8332",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.7.19.0"
      },
      {
        "model": "sterling control center ifix03",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.1.0"
      },
      {
        "model": "tivoli network manager ip edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.9"
      },
      {
        "model": "jre 1.6.0 31",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "security access manager for mobile",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.021"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2"
      },
      {
        "model": "websphere partner gateway advanced edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.1.4"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.4"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "clustered data ontap rc1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.2"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.2"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "db2 query management facility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "11.1"
      },
      {
        "model": "emptoris spend analysis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.13"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.2.0"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.61"
      },
      {
        "model": "db2\u00ae advanced workgroup server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0"
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.2"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.72"
      },
      {
        "model": "tivoli monitoring fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.302"
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.1"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.3"
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.6"
      },
      {
        "model": "cics transaction gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1"
      },
      {
        "model": "infosphere optim performance manager for db2 on unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.3"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.4"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.4"
      },
      {
        "model": "rational build utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "java se embedded 7u45",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "system m5 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x325054580"
      },
      {
        "model": "security identity manager virtual appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "tivoli storage manager for virtual environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.0.0"
      },
      {
        "model": "lotus quickr for websphere portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.0"
      },
      {
        "model": "flashcopy manager for custom applications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.4"
      },
      {
        "model": "cognos controller fp1 if2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2"
      },
      {
        "model": "cognos tm1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1.1"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.060"
      },
      {
        "model": "flashcopy manager for unix and linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.1"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.02"
      },
      {
        "model": "(comware r3108p03",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "51307)"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.4"
      },
      {
        "model": "smartcloud orchestrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.14"
      },
      {
        "model": "infosphere data architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.2"
      },
      {
        "model": "bladecenter advanced management module 25r5778",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tivoli network performance manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.3"
      },
      {
        "model": "jrockit r28.2.2",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "enterprise linux desktop supplementary",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "jdk update21",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "sterling control center ifix02",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.34"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.2"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.0.1"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.1.10"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.12.5"
      },
      {
        "model": "rational developer for aix and cobol",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "infosphere optim performance manager for db2 on linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "java sdk sr13-fp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6"
      },
      {
        "model": "hi (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "55005)0"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.12"
      },
      {
        "model": "oceanstor s5800t v200r001c00spc800",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "openjdk",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.8.0"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.014"
      },
      {
        "model": "ultravr v100r003c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.12.1"
      },
      {
        "model": "system m3 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x355042540"
      },
      {
        "model": "flex system chassis management module 2pet10i",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "endpoint manager for security configuration management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5"
      },
      {
        "model": "jrockit r27.8.4",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.1.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.029"
      },
      {
        "model": "tivoli directory integrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.1"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.4"
      },
      {
        "model": "tivoli composite application manager for transactions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3.0.1"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.6"
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.0.0"
      },
      {
        "model": "pureapplication system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.21"
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.5"
      },
      {
        "model": "security access manager for web",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.4"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.2"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.1"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0.1"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.5"
      },
      {
        "model": "network advisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "12.4.2"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.15"
      },
      {
        "model": "(comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "59507)0"
      },
      {
        "model": "rc4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rsa",
        "version": "0"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.77"
      },
      {
        "model": "sterling connect:direct browser user interface",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.10"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.24"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.4"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "tivoli monitoring fp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.1.5"
      },
      {
        "model": "rlks administration and reporting tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.4.6"
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "websphere process server hypervisor edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.1"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.1.1"
      },
      {
        "model": "security access manager for web",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.1"
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.28"
      },
      {
        "model": "data server runtime client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "power",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5750"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.70"
      },
      {
        "model": "linux sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0.0"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.030"
      },
      {
        "model": "java sdk sr13",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6"
      },
      {
        "model": "tivoli monitoring fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.209"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.9"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "smartcloud provisioning",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.41"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.3"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.0.0"
      },
      {
        "model": "jrockit r27.7.4",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.015"
      },
      {
        "model": "smc2.0 v100r002c04",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.11"
      },
      {
        "model": "tivoli storage manager for virtual environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.4.0.0"
      },
      {
        "model": "flex system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.1.0"
      },
      {
        "model": "enterprise linux server eus 6.6.z",
        "scope": null,
        "trust": 0.3,
        "vendor": "redhat",
        "version": null
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.3.0.4"
      },
      {
        "model": "infosphere discovery",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.051"
      },
      {
        "model": "msr2000 (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7)0"
      },
      {
        "model": "security appscan standard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.7"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.8"
      },
      {
        "model": "flashcopy manager for oracle with sap environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.0"
      },
      {
        "model": "flashcopy manager for oracle with sap environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1.2"
      },
      {
        "model": "flex system chassis management module 2pet12p",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "f1000-e (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "flex system compute node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x2207906"
      },
      {
        "model": "policy center v100r003c10",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.13"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.2.4"
      },
      {
        "model": "sterling connect:enterprise for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.0.0"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.42"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.6"
      },
      {
        "model": "infosphere optim performance manager for db2 on windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "bladecenter -t",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8720"
      },
      {
        "model": "system storage ts3400 tape library",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0053"
      },
      {
        "model": "java sdk 7r1 sr1",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "db2\u00ae connect? unlimited edition for system z\u00ae",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.2"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.2.0"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.4"
      },
      {
        "model": "initiate master data service patient hub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "flex system chassis management module 2pet10g",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.13"
      },
      {
        "model": "aura system platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.2"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.2"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.27"
      },
      {
        "model": "tivoli monitoring for tivoli storage manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "pureapplication system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.0.1"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "jrockit r27.7.7",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "tivoli monitoring",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.30"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.1"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.7"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.2"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.1"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.7.3"
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.9"
      },
      {
        "model": "rational synergy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.3"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.7"
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.45"
      },
      {
        "model": "jrockit r28.3.5",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "websphere application server community edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0.4"
      },
      {
        "model": "image construction and composition tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.1.1"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6.0.1"
      },
      {
        "model": "data server driver package",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "infosphere optim performance manager for db2 on windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.3"
      },
      {
        "model": "jre update5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "cognos controller if4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "sdk for node.js",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.7"
      },
      {
        "model": "pureapplication system",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.0.2"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.16"
      },
      {
        "model": "rational sap connector",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.8"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.12.2"
      },
      {
        "model": "data server client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.035"
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5.1"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5"
      },
      {
        "model": "initiate master data service",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "db2 connect unlimited edition for system i fp11",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "operations agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.03"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.3"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0.2"
      },
      {
        "model": "sonas",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.2.1"
      },
      {
        "model": "jdk update11",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "rational policy tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.3.0"
      },
      {
        "model": "smartcloud provisioning for software virtual appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.2"
      },
      {
        "model": "java sdk sr3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.42"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.3"
      },
      {
        "model": "flex system chassis management module 2pete6l",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "system type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x3850x638370"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.026"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.2"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.1"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.7"
      },
      {
        "model": "cognos business viewpoint fp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1.1"
      },
      {
        "model": "websphere partner gateway enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.1.4"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35007.1"
      },
      {
        "model": "tivoli netcool configuration manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.4.1.2"
      },
      {
        "model": "operations analytics predictive insights",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.2"
      },
      {
        "model": "communications policy management",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "9.9.2"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.4"
      },
      {
        "model": "connect-it",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.52"
      },
      {
        "model": "system networking rackswitch g8316",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.9.13.0"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0.0"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.9"
      },
      {
        "model": "cognos business viewpoint if4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1.0.1"
      },
      {
        "model": "netezza platform software",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.12"
      },
      {
        "model": "domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.2"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.33"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.15"
      },
      {
        "model": "rational doors next generation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3.0.3"
      },
      {
        "model": "sdk for node.js",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.3"
      },
      {
        "model": "powervc standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.0.4"
      },
      {
        "model": "jrockit r27.1.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.2.2"
      },
      {
        "model": "rational developer for power systems software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.6"
      },
      {
        "model": "os image for aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.1.0"
      },
      {
        "model": "power ps703",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "(7891-73x)0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.31"
      },
      {
        "model": "infosphere optim performance manager for db2 on linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1"
      },
      {
        "model": "lotus expeditor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.3"
      },
      {
        "model": "bladecenter -ht",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8750"
      },
      {
        "model": "tivoli monitoring fixpack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.24"
      },
      {
        "model": "web experience factory",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "enterprise linux supplementary server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "5"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.18"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.4.1"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.50"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.14"
      },
      {
        "model": "release control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.21"
      },
      {
        "model": "oceanstor s5500t v200r002c10",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.0.13"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.76"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.721"
      },
      {
        "model": "security access manager for web",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "system m3 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x365042550"
      },
      {
        "model": "jrockit r28.1.4",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "emptoris spend analysis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.2.6"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37006.1"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "secblade fw (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.2"
      },
      {
        "model": "smc2.0 v100r002c02",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.8.2.1"
      },
      {
        "model": "cognos controller fp3 if2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1.1"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.4"
      },
      {
        "model": "db2 express edition fp6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "power hmc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.7.8.0"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.040"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.0.31"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "security network controller 1.0.3379m",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.8"
      },
      {
        "model": "rational lifecycle integration adapter",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.2"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.065"
      },
      {
        "model": "enterprise linux desktop client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "5"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.2"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.8"
      },
      {
        "model": "optim performance manager for db2 on linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.1.185"
      },
      {
        "model": "abyp-4ts-p-m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "jrockit r27.6.6",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "operations agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.14"
      },
      {
        "model": "sterling connect:express for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.0.11"
      },
      {
        "model": "rational doors next generation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.1"
      },
      {
        "model": "spectrum scale",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.1.0"
      },
      {
        "model": "system storage ts2900 tape librray",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0033"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.7"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1"
      },
      {
        "model": "netezza platform software 7.0.4.8-p1",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "data ontap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "rational sap connector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.3"
      },
      {
        "model": "pureapplication system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.10"
      },
      {
        "model": "os image for red hat",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0.0.1"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37007.4.0.5"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.2.1"
      },
      {
        "model": "jrockit r27.6.8",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6.0.3"
      },
      {
        "model": "oceanstor s5800t v200r002c20spc200",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.0.4"
      },
      {
        "model": "storwize unified",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70001.4"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.71"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1.2"
      },
      {
        "model": "netiq sentinel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "8.0"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.065"
      },
      {
        "model": "operations agent virtual appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.13"
      },
      {
        "model": "4500g (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "tivoli monitoring",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.0"
      },
      {
        "model": "pureapplication system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.11"
      },
      {
        "model": "websphere ilog jrules",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "tivoli monitoring fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.305"
      },
      {
        "model": "sterling connect:direct for microsoft windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.5.00"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.26"
      },
      {
        "model": "lotus notes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.01"
      },
      {
        "model": "oceanstor s2600t v200r002c30",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3"
      },
      {
        "model": "tivoli monitoring",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2"
      },
      {
        "model": "sametime",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.0.0"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.4"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0"
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.3"
      },
      {
        "model": "abyp-0t-2s-2l-p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70007.3.0.10"
      },
      {
        "model": "jrockit r28.1.5",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.0.45"
      },
      {
        "model": "integration bus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.1.4"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "7"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.2.0"
      },
      {
        "model": "tivoli endpoint manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.0"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.13"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.17"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.7.4"
      },
      {
        "model": "smc2.0 v100r003c10spc100",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "rational developer for system z if3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.037"
      },
      {
        "model": "rational reporting for development intelligence",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.01"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.5"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.6.1"
      },
      {
        "model": "rational team concert ifix3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.7"
      },
      {
        "model": "tivoli storage manager client management services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "flex system chassis management module 2peo12o",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70007.2"
      },
      {
        "model": "tivoli directory integrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.17"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.1"
      },
      {
        "model": "tivoli netcool impact",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3"
      },
      {
        "model": "rational insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.1.7"
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.2.2"
      },
      {
        "model": "sametime community server limited use",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9"
      },
      {
        "model": "powervc standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.1.2"
      },
      {
        "model": "db2\u00ae express edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.12"
      },
      {
        "model": "flex system compute node type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x24087370"
      },
      {
        "model": "system type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x3690x571470"
      },
      {
        "model": "connect-it",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.60"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.0"
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.2"
      },
      {
        "model": "rational developer for power systems software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.31"
      },
      {
        "model": "content collector for sap applications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0"
      },
      {
        "model": "p6000 command view software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.3.1"
      },
      {
        "model": "notes and domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.5"
      },
      {
        "model": "sterling connect:direct browser user interface",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.0.10"
      },
      {
        "model": "tivoli key lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0.1"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.31"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.0"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.5"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.7"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3.0.1"
      },
      {
        "model": "s12700 v200r006c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "jrockit r28.2.3",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.045"
      },
      {
        "model": "tivoli system automation application manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2"
      },
      {
        "model": "system m2 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x365041990"
      },
      {
        "model": "rational synergy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.6"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "350.30"
      },
      {
        "model": "jrockit r27.6.4",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "flashcopy manager for oracle with sap environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.1.1"
      },
      {
        "model": "security network controller 1.0.3352m",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.11"
      },
      {
        "model": "algo one",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.9"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.2"
      },
      {
        "model": "flex system manager node types",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "87340"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.041"
      },
      {
        "model": "power",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7500"
      },
      {
        "model": "sterling connect:direct for openvms",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.4.1"
      },
      {
        "model": "rational synergy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.5"
      },
      {
        "model": "power express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "560"
      },
      {
        "model": "websphere datapower xc10 appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1"
      },
      {
        "model": "s12700 v200r007c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "tivoli endpoint manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "infosphere information server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "11.3"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.2"
      },
      {
        "model": "rational developer for system z if3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.1.12"
      },
      {
        "model": "smb1910 (comware r1108",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "security appscan standard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "flex system chassis management module 2pet10e",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "operations manager for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "8.10"
      },
      {
        "model": "business process monitor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.02"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "algo credit limits",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.5.0"
      },
      {
        "model": "db2\u00ae connect? application server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "powervc standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.0.0"
      },
      {
        "model": "flashcopy manager for oracle",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.0"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.13"
      },
      {
        "model": "smartcloud orchestrator fp1 ifix6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.3"
      },
      {
        "model": "emptoris spend analysis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.12"
      },
      {
        "model": "infosphere guardium",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "predictiveinsight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1"
      },
      {
        "model": "integration bus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10"
      },
      {
        "model": "flashcopy manager for db2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.4"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.045"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.16"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1"
      },
      {
        "model": "power express f/c",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5504667"
      },
      {
        "model": "emptoris strategic supply management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.4"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.0.5"
      },
      {
        "model": "power express f/c",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5205587"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.22"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.80"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.1"
      },
      {
        "model": "performance manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.20"
      },
      {
        "model": "jrockit r27.7.6",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.50"
      },
      {
        "model": "asset manager cloudsystem chargeback",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.40"
      },
      {
        "model": "ds8700",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "76.31.143.0"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "5"
      },
      {
        "model": "db2 connect application server edition fp11",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.13"
      },
      {
        "model": "hp-ux web server suite hpuxwsatw406",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hp",
        "version": "4.06"
      },
      {
        "model": "websphere process server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2"
      },
      {
        "model": "db2\u00ae advanced workgroup server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.15"
      },
      {
        "model": "tivoli business service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2"
      },
      {
        "model": "java sdk sr2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7"
      },
      {
        "model": "clustered data ontap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2"
      },
      {
        "model": "tivoli common reporting",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.1"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37007.3.0.5"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.4"
      },
      {
        "model": "infosphere optim query workload tuner for db2 for luw",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.0.2"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.3"
      },
      {
        "model": "websphere message broker",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0"
      },
      {
        "model": "system m4 bd type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x365054660"
      },
      {
        "model": "rational synergy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.7"
      },
      {
        "model": "infosphere optim configuration manager for db2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1"
      },
      {
        "model": "rational reporting for development intelligence",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.1"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.6"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35006.4.19"
      },
      {
        "model": "abyp-10g-4sr-1-p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.25"
      },
      {
        "model": "initiate master data service provider hub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "cloud manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.0.1"
      },
      {
        "model": "vsr (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7)0"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.2"
      },
      {
        "model": "oceanstor s5500t v200r002c20spc200",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "jdk update13",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.4"
      },
      {
        "model": "rational insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.11"
      },
      {
        "model": "dataquant",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.1"
      },
      {
        "model": "data ontap",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.3"
      },
      {
        "model": "tivoli directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2"
      },
      {
        "model": "oceanstor 18800f v100r001c20",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.6"
      },
      {
        "model": "cloud manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.12.3"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.1"
      },
      {
        "model": "tivoli netcool/omnibus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.2"
      },
      {
        "model": "java se embedded 7u25",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.02"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.33"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.5"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.90"
      },
      {
        "model": "enterprise linux server supplementary",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.80"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.6"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.1.5"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.00"
      },
      {
        "model": "db2\u00ae express edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "oceanstor s5800t v200r002c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "flashcopy manager for oracle with sap environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.0"
      },
      {
        "model": "sparc enterprise m8000 xcp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1117"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5"
      },
      {
        "model": "sterling control center ifix04",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.0.1"
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5.2"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.5"
      },
      {
        "model": "jdk update4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "tivoli monitoring",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.3"
      },
      {
        "model": "rational doors web access",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.16.3"
      },
      {
        "model": "infosphere optim query workload tuner for db2 for luw",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.1"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.024"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.17"
      },
      {
        "model": "tivoli storage manager operations center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.4.1000"
      },
      {
        "model": "systems director storage control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.2.0"
      },
      {
        "model": "smartcloud provisioning",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.0.5"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "tecal e6000 chassis v100r001c00",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.1"
      },
      {
        "model": "informix genero",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.50"
      },
      {
        "model": "system type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x3690x571490"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.4.2"
      },
      {
        "model": "predictiveinsight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3"
      },
      {
        "model": "hsr6800 (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7)0"
      },
      {
        "model": "jre 1.6.0 33",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "tivoli storage manager administration center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.10"
      },
      {
        "model": "security network controller 1.0.3381m",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "oceanstor s2600t v200r002c20spc200",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "power hmc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.7.9.0"
      },
      {
        "model": "cognos planning",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "virtualization performance viewer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2.01"
      },
      {
        "model": "rational developer for i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "linux lts i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "12.04"
      },
      {
        "model": "flashsystem 9843-ae2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "840"
      },
      {
        "model": "sdk for node.js",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.9"
      },
      {
        "model": "sparc enterprise m3000 xcp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1117"
      },
      {
        "model": "enterprise linux hpc node supplementary",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.32"
      },
      {
        "model": "tivoli storage flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.1.1"
      },
      {
        "model": "sdk for node.js",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1"
      },
      {
        "model": "tivoli storage manager for virtual environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.2"
      },
      {
        "model": "propel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2.01"
      },
      {
        "model": "system storage ts3400 tape library",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0042"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37007.2.0.5"
      },
      {
        "model": "infosphere optim performance manager for db2 on windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.1.1"
      },
      {
        "model": "netiq sentinel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "7.4.2"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.1.1"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.10.0"
      },
      {
        "model": "opensuse",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "s u s e",
        "version": "13.1"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.029"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70007.1.0.5"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.6"
      },
      {
        "model": "bladecenter t advanced management module 32r0835",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "notes and domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.1"
      },
      {
        "model": "tivoli netcool/omnibus webgui",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1"
      },
      {
        "model": "jrockit r28.2.6",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.0.0"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.1"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.1"
      },
      {
        "model": "content collector for sap applications",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.0.2"
      },
      {
        "model": "virtualization performance viewer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "1.20"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.2"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.11"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.2"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0.5"
      },
      {
        "model": "sparc enterprise m9000 xcp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1118"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "oceanstor s2600t v200r002c20",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor s2600t v200r002c10",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "operations agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.01"
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.1.3"
      },
      {
        "model": "rational insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.1.6"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.6"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.0.1"
      },
      {
        "model": "rational insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.1.5"
      },
      {
        "model": "tivoli system automation for multiplatforms",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.2.6"
      },
      {
        "model": "communications policy management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "0"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.41"
      },
      {
        "model": "rse ru r3303p18",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "66005"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.3"
      },
      {
        "model": "storwize unified",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70001.5.2.0"
      },
      {
        "model": "rational synergy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.7"
      },
      {
        "model": "sonas",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.2.2"
      },
      {
        "model": "msr (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "30-165)0"
      },
      {
        "model": "rational directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "rational tau",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.31"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.023"
      },
      {
        "model": "tivoli netcool/omnibus webgui",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3.1"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.3"
      },
      {
        "model": "jre update6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6.0.2"
      },
      {
        "model": "flashcopy manager for db2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.1"
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.41"
      },
      {
        "model": "db2\u00ae connect? unlimited edition for system z\u00ae",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "lotus widget factory",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0.0.1"
      },
      {
        "model": "data server driver package",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "system m4 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x353071600"
      },
      {
        "model": "initiate master data service patient hub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "tivoli access manager for e-business",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0"
      },
      {
        "model": "cics transaction gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.14"
      },
      {
        "model": "flashcopy manager for custom applications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.0"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.13"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.0.470"
      },
      {
        "model": "java sdk sr16-fp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "system storage ts2900 tape library",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0034"
      },
      {
        "model": "flashcopy manager for custom applications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1.2"
      },
      {
        "model": "abyp-4tl-p-m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "data server client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.1.13"
      },
      {
        "model": "websphere partner gateway enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.022"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37007.1.0.7"
      },
      {
        "model": "rational reporting for development intelligence",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0.3"
      },
      {
        "model": "flex system fc3171 8gb san switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.2"
      },
      {
        "model": "system storage ts3400 tape library",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0040"
      },
      {
        "model": "workload deployer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.11"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1.5"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.4"
      },
      {
        "model": "jrockit r27.7.2",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37006.2"
      },
      {
        "model": "spectrum scale",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.0.2"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.12"
      },
      {
        "model": "cognos controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1.1"
      },
      {
        "model": "performance manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.00"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.09"
      },
      {
        "model": "rational developer for aix and linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.0"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.8.0"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1"
      },
      {
        "model": "ds8870",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "87.51.14.0"
      },
      {
        "model": "flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1"
      },
      {
        "model": "smartcloud orchestrator fp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.3"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.0.29"
      },
      {
        "model": "smartcloud provisioning",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.3"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.1"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.22"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.46"
      },
      {
        "model": "s7700 v200r005c00spc300",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.01"
      },
      {
        "model": "java sdk 6r1 sr8-fp3",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "sterling control center ifix03",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.2.1"
      },
      {
        "model": "infosphere optim query workload tuner for db2 for luw",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2"
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.1.2"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.25"
      },
      {
        "model": "rational developer for i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1.1"
      },
      {
        "model": "infosphere data replication dashboard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "enterprise common collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70007.1"
      },
      {
        "model": "lotus expeditor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.1"
      },
      {
        "model": "jdk update5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "aura system platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.2.1.0.9"
      },
      {
        "model": "cognos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2.2.1.1"
      },
      {
        "model": "power express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7200"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.010"
      },
      {
        "model": "rational agent controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "abyp-4t-0s-0l-p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "northstar controller application service pack",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "2.1.01"
      },
      {
        "model": "rational developer for power systems software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.02"
      },
      {
        "model": "s9700 v200r007c10",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.11"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50006.3"
      },
      {
        "model": "p6000 command view software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.3.6"
      },
      {
        "model": "sterling connect:direct browser ifix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.0.213"
      },
      {
        "model": "jrockit r28.1.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "optim performance manager for db2 on unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1"
      },
      {
        "model": "rational lifecycle integration adapter for hp alm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2"
      },
      {
        "model": "toolscenter suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.52"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.4.10"
      },
      {
        "model": "websphere message broker toolkit",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0"
      },
      {
        "model": "rational sap connector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.6"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "pureapplication system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.2"
      },
      {
        "model": "os image for red hat",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0.0"
      },
      {
        "model": "operations agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.10"
      },
      {
        "model": "flashsystem 9848-ac0",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v840"
      },
      {
        "model": "websphere portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "operations agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.13"
      },
      {
        "model": "infosphere optim performance manager for db2 on windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.3.1"
      },
      {
        "model": "aura system platform sp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "xiv storage system gen2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "28100"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35006.2"
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.51"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "image construction and composition tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.3.2.0"
      },
      {
        "model": "flex system chassis management module 2pet12e",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.3"
      },
      {
        "model": "i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "jrockit r28.2.9",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "tivoli netcool impact",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "aura system platform sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.2"
      },
      {
        "model": "infosphere master data management standard/advanced edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "11.4"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.4"
      },
      {
        "model": "system type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x3850x571910"
      },
      {
        "model": "system networking rackswitch g8264",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.9.12.0"
      },
      {
        "model": "cognos controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2"
      },
      {
        "model": "connect-it",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.53"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.1"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1"
      },
      {
        "model": "linux",
        "scope": null,
        "trust": 0.3,
        "vendor": "gentoo",
        "version": null
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.32"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.4"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.8.2"
      },
      {
        "model": "oceanstor v100r001c20",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "18800"
      },
      {
        "model": "tivoli storage flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.4"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.2"
      },
      {
        "model": "flex system chassis management module 2pet12o",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "security privileged identity manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.1"
      },
      {
        "model": "websphere partner gateway advanced edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.1.2"
      },
      {
        "model": "rational synergy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.5"
      },
      {
        "model": "rational tau",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.32"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.1"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "infosphere discovery",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.5"
      },
      {
        "model": "db2\u00ae connect? enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.3.0"
      },
      {
        "model": "service manager software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.40"
      },
      {
        "model": "infosphere data replication dashboard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "11.3.3"
      },
      {
        "model": "workload deployer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.12"
      },
      {
        "model": "powervc express edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.10"
      },
      {
        "model": "cloud manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.4"
      },
      {
        "model": "flex system chassis management module 2pet10h",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.1.0"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.710"
      },
      {
        "model": "infosphere information server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1"
      },
      {
        "model": "security network controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.3379"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.11.2"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.5"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.16"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.0.27"
      },
      {
        "model": "system type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x3850x571450"
      },
      {
        "model": "java sdk sr11",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6"
      },
      {
        "model": "power ps701",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "java sdk sr15",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "cognos command center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.23"
      },
      {
        "model": "tivoli monitoring fp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.302"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.1"
      },
      {
        "model": "mashup center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0.1"
      },
      {
        "model": "operations agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.05"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6"
      },
      {
        "model": "security appscan standard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70007.1.0.7"
      },
      {
        "model": "rlks administration and reporting tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.4.5"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.2"
      },
      {
        "model": "rational sap connector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.5"
      },
      {
        "model": "power ps704",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "(7891-74x)0"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.6"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.3"
      },
      {
        "model": "sonas",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.0.2"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3"
      },
      {
        "model": "jre update1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "tivoli netcool/omnibus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.4"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.12"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.20"
      },
      {
        "model": "rational developer for power systems software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.03"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.60"
      },
      {
        "model": "java se embedded 7u51",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "s12700 v200r007sph003",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "sterling connect:enterprise for unix build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.4.4.0198"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.031"
      },
      {
        "model": "tivoli continuous data protection for files",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1"
      },
      {
        "model": "rational developer for aix and cobol",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.0.1"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.7"
      },
      {
        "model": "tivoli provisioning manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2"
      },
      {
        "model": "business process monitor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.23"
      },
      {
        "model": "enterprise linux hpc node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50007.3.0.5"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.2"
      },
      {
        "model": "security directory integrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.9"
      },
      {
        "model": "asset manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.31"
      },
      {
        "model": "infosphere optim query workload tuner for db2 for z/os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2"
      },
      {
        "model": "notes and domino fp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.13"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.030"
      },
      {
        "model": "tivoli system automation for multiplatforms",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.1"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "sparc enterprise m5000 xcp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1117"
      },
      {
        "model": "notes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.1"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.1"
      },
      {
        "model": "db2\u00ae express edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "cognos controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "websphere service registry and repository studio",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.17"
      },
      {
        "model": "5500si (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "informix genero",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.32"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.060"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "security network controller 1.0.3361m",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.4"
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.11"
      },
      {
        "model": "bladecenter -s",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1948"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.78"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.019"
      },
      {
        "model": "spectrum scale",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.0.1"
      },
      {
        "model": "rational sap connector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.4"
      },
      {
        "model": "api management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0"
      },
      {
        "model": "sterling connect:express for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.0.9"
      },
      {
        "model": "ei (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "55005)0"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "jre 1.6.0 37",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "350.50"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.4.2"
      },
      {
        "model": "s7700 v200r006c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.3.50"
      },
      {
        "model": "tivoli monitoring for tivoli storage manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.2"
      },
      {
        "model": "rational developer for system z if3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "db2 connect enterprise edition fp11",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.1"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.19"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.13"
      },
      {
        "model": "system networking rackswitch g8264",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.9.13.0"
      },
      {
        "model": "netezza platform software",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2"
      },
      {
        "model": "emptoris strategic supply management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0"
      },
      {
        "model": "s7700 v200r007sph003",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "hp-ux apache-based web server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2.2.15.23"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.2"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.1.2"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.2"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.410"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.060"
      },
      {
        "model": "release control 9.21p1",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.22"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.34"
      },
      {
        "model": "infosphere optim performance manager for db2 on linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "oceanstor v100r001c01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "9000"
      },
      {
        "model": "db2\u00ae advanced enterprise server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.8"
      },
      {
        "model": "flex system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.0.0"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "security access manager for mobile",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.3"
      },
      {
        "model": "workload deployer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.16"
      },
      {
        "model": "tivoli netcool/reporter",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2"
      },
      {
        "model": "jrockit r28.2.8",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "rational automation framework",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.1"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3"
      },
      {
        "model": "sametime",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.0.1"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6"
      },
      {
        "model": "emptoris sourcing",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.2.6"
      },
      {
        "model": "safari",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "system networking rackswitch g8316",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.9.100"
      },
      {
        "model": "jrockit r27.6.2",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "flex system manager node types",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "79550"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.1"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70007.4.0.5"
      },
      {
        "model": "db2\u00ae connect? unlimited edition for system i\u00ae",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.2"
      },
      {
        "model": "rational engineering lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.4"
      },
      {
        "model": "system m4 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x350073830"
      },
      {
        "model": "image construction and composition tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.3.1.0"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.0.3"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.56"
      },
      {
        "model": "infosphere optim performance manager for db2 on linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.3"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.4"
      },
      {
        "model": "data studio client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.1"
      },
      {
        "model": "websphere mq internet pass-thru",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.0.2"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.25"
      },
      {
        "model": "cognos business viewpoint if3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1.1.2"
      },
      {
        "model": "aura system platform sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0"
      },
      {
        "model": "openpages grc platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.1"
      },
      {
        "model": "sterling connect:direct browser user interface",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.51"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.039"
      },
      {
        "model": "websphere process server hypervisor edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "tivoli network manager ip edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.4"
      },
      {
        "model": "license metric tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "service manager software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.33"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.0.2"
      },
      {
        "model": "rational engineering lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0"
      },
      {
        "model": "flashsystem 9843-ae1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "840"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.27"
      },
      {
        "model": "notes and domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "sterling connect:direct browser",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5"
      },
      {
        "model": "sterling connect:express for unix ifix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.0.11150-11"
      },
      {
        "model": "java sdk sr8-fp10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7"
      },
      {
        "model": "operations agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.13"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.026"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.54"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.4"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.6.3.1"
      },
      {
        "model": "tivoli composite application manager for transactions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.4"
      },
      {
        "model": "tivoli storage manager for virtual environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.0"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.2"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.11.1"
      },
      {
        "model": "megaraid storage manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "15.03.01.00"
      },
      {
        "model": "flashsystem 9848-ae1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v840"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.5"
      },
      {
        "model": "qradar siem patch ifix01",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.44"
      },
      {
        "model": "tivoli access manager for e-business",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.1"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.16"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0.2"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.5"
      },
      {
        "model": "java sdk sr4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7"
      },
      {
        "model": "websphere operational decision management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "tivoli key lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0"
      },
      {
        "model": "db2\u00ae connect? enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.3"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6.0.1"
      },
      {
        "model": "jrockit r28.2.4",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.210"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.3"
      },
      {
        "model": "tivoli monitoring",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.1"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.9"
      },
      {
        "model": "msr 50-g2 (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "security network controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.913"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37007.2.0.8"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.3"
      },
      {
        "model": "tivoli directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "model": "bsm connector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.21"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.0"
      },
      {
        "model": "system m3 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x365079450"
      },
      {
        "model": "rational lifecycle integration adapter",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.2.1"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.12.4"
      },
      {
        "model": "jrockit r27.6.9",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.5"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70006.4.19"
      },
      {
        "model": "websphere process server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.4"
      },
      {
        "model": "websphere partner gateway enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.1.2"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.4.6"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.9"
      },
      {
        "model": "flashcopy manager for oracle",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.4"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.1"
      },
      {
        "model": "flashsystem 9846-ae1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "840"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.040"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.0.6"
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.6"
      },
      {
        "model": "power systems 350.a0",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "xiv storage system gen",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.32"
      },
      {
        "model": "flashcopy manager for custom applications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.0"
      },
      {
        "model": "jrockit r27.6.3",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "maximo asset management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "infosphere identity insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "1/10gb uplink ethernet switch module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "powervc express edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.0.1"
      },
      {
        "model": "tealeaf customer experience",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70006.4.1.8"
      },
      {
        "model": "websphere lombardi edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.2"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.2.3"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.4.1"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70006.1"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.0.11"
      },
      {
        "model": "flex system compute node type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x88042590"
      },
      {
        "model": "emptoris sourcing",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.2.0"
      },
      {
        "model": "cognos insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2.1"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "bladecenter -e",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7967"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.51"
      },
      {
        "model": "idataplex dx360 m4 water cooled type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "79790"
      },
      {
        "model": "flex system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.0.1"
      },
      {
        "model": "jdk update1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.23"
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.61"
      },
      {
        "model": "dataquant",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1"
      },
      {
        "model": "opensuse",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "s u s e",
        "version": "13.2"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.4"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.8.06"
      },
      {
        "model": "emptoris spend analysis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.24"
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.44"
      },
      {
        "model": "dataquant fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.13"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "security appscan standard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "rational automation framework",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.8.2.1"
      },
      {
        "model": "java se embedded 7u75",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "spectrum scale",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.1.1"
      },
      {
        "model": "b2b advanced communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.0.2"
      },
      {
        "model": "system networking rackswitch g8124-e",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.9.13.0"
      },
      {
        "model": "infosphere biginsights",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0.2"
      },
      {
        "model": "financial transaction manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.1.8"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.12.0"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.2"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.071"
      },
      {
        "model": "enterprise linux client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "5"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.12"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.16"
      },
      {
        "model": "domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.3"
      },
      {
        "model": "sterling connect:enterprise for unix ifix03",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.0.3"
      },
      {
        "model": "business process monitor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.20"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35007.5"
      },
      {
        "model": "rational software architect ifix1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.4.2"
      },
      {
        "model": "websphere service registry and repository",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.0"
      },
      {
        "model": "infosphere discovery for zos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.6"
      },
      {
        "model": "power express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7300"
      },
      {
        "model": "infosphere optim performance manager for db2 on unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1.1"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "sterling connect:direct for microsoft windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.5.01"
      },
      {
        "model": "msr1000 (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7)0"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.4.1"
      },
      {
        "model": "jre update21",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "tivoli continuous data protection for files",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3"
      },
      {
        "model": "rational doors next generation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.2"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.06"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.18"
      },
      {
        "model": "db2\u00ae workgroup server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.6"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.11"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.9"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.7"
      },
      {
        "model": "tivoli security compliance manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1"
      },
      {
        "model": "data studio client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2"
      },
      {
        "model": "db2\u00ae advanced enterprise server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.11"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.08"
      },
      {
        "model": "rational directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.0.2"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.6"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.21"
      },
      {
        "model": "msr20-1x (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.037"
      },
      {
        "model": "pureapplication system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0.0.1"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.7"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.1.1"
      },
      {
        "model": "netezza platform software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.45"
      },
      {
        "model": "cognos tm1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2.0.2"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.8"
      },
      {
        "model": "powervc standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.2.2"
      },
      {
        "model": "operations manager for linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.11"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.8"
      },
      {
        "model": "rational developer for i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "rlks administration and reporting tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.4.3"
      },
      {
        "model": "tivoli storage manager operations center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.4.2000"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.1"
      },
      {
        "model": "p6000 command view software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.3.3"
      },
      {
        "model": "system m4 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x365079150"
      },
      {
        "model": "abyp-10g-4lr-1-p-m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.13"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1.6"
      },
      {
        "model": "sparc enterprise m9000 xcp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1121"
      },
      {
        "model": "predictiveinsight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.6"
      },
      {
        "model": "tivoli monitoring fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.205"
      },
      {
        "model": "smartcloud orchestrator fp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2"
      },
      {
        "model": "db2 advanced enterprise server edition fp11",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "qradar siem mr2 patch ifi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.110"
      },
      {
        "model": "data server runtime client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "infosphere guardium",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.2"
      },
      {
        "model": "hp-ux tomcat servlet engine",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.5.36.02"
      },
      {
        "model": "infosphere discovery for information integration",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.3"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.11.0"
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.1"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.1"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.6"
      },
      {
        "model": "cics transaction gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.2"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.6"
      },
      {
        "model": "bladecenter -e",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1881"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.18"
      },
      {
        "model": "jre",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "tivoli storage manager administration center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2"
      },
      {
        "model": "security network controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.1768"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.4.0"
      },
      {
        "model": "security access manager for mobile",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.1"
      },
      {
        "model": "abyp-0t-0s-4l-p-m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "rational developer for power systems software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.62"
      },
      {
        "model": "abyp-4t-0s-0l-p-m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.7"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.41"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.1"
      },
      {
        "model": "infosphere data architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.12"
      },
      {
        "model": "systems director storage control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.3.1"
      },
      {
        "model": "flashcopy manager for oracle with sap environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.0"
      },
      {
        "model": "db2 connect unlimited edition for system i fp6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "emptoris spend analysis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.10"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.2"
      },
      {
        "model": "sterling connect:direct browser ifix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.11.04"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.2.177"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0"
      },
      {
        "model": "system networking rackswitch g8000",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "storediq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.6"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.13.1"
      },
      {
        "model": "initiate master data service",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.3"
      },
      {
        "model": "toolscenter suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.41"
      },
      {
        "model": "sametime community server hf1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.9"
      },
      {
        "model": "business process monitor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.03"
      },
      {
        "model": "sterling connect:direct browser user interface",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.1.11"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1.3"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.3.4"
      },
      {
        "model": "flashcopy manager for oracle",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.0.1"
      },
      {
        "model": "jre update25",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3.0.1"
      },
      {
        "model": "rational reporting for development intelligence",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.2"
      },
      {
        "model": "linux lts amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "12.04"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "infosphere data replication dashboard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.2"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1"
      },
      {
        "model": "rational synergy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.1.2"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.2"
      },
      {
        "model": "flex system chassis management module 2peo12p",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "rational developer for aix and linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "websphere dashboard framework",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "notes",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "abyp-0t-2s-2l-p-m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "security directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.4"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.34"
      },
      {
        "model": "rational collaborative lifecycle management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.1"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.1"
      },
      {
        "model": "rational engineering lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.7"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70006.3"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.211"
      },
      {
        "model": "tivoli monitoring fp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.235"
      },
      {
        "model": "operations manager for linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.20"
      },
      {
        "model": "system m4 hd type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x365054600"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.1"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.6"
      },
      {
        "model": "operations agent virtual appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.12"
      },
      {
        "model": "netiq sentinel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "0"
      },
      {
        "model": "db2\u00ae workgroup server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.4"
      },
      {
        "model": "jrockit r27.7.5",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.1.0"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.0.2"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.33"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.14"
      },
      {
        "model": "te60 v100r001c10spc300",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.13"
      },
      {
        "model": "db2\u00ae advanced enterprise server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.6"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.7.2"
      },
      {
        "model": "rational doors web access",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.6"
      },
      {
        "model": "operational decision manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.7"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.20"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.32"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "rational engineering lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.3"
      },
      {
        "model": "db2 connect enterprise edition fp6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "toolscenter suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.53"
      },
      {
        "model": "rational synergy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.7.003"
      },
      {
        "model": "tivoli composite application manager for soa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1"
      },
      {
        "model": "rlks administration and reporting tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.4.2"
      },
      {
        "model": "personal communications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.10"
      },
      {
        "model": "workload deployer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.17"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.18"
      },
      {
        "model": "db2\u00ae express edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.8"
      },
      {
        "model": "oceanstor s5600t v200r002c10",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.141"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1.1"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.12"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.3"
      },
      {
        "model": "flashsystem 9846-ac0",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v840"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.4"
      },
      {
        "model": "4210g (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "system idataplex dx360 m2 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x63800"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1"
      },
      {
        "model": "tivoli storage manager for virtual environments",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "smartcloud entry",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.3.0"
      },
      {
        "model": "security privileged identity manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.0.1"
      },
      {
        "model": "content collector for sap applications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2"
      },
      {
        "model": "netezza platform software 7.0.2.16-p1",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.0"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.16"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.21"
      },
      {
        "model": "emptoris sourcing",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.0.0"
      },
      {
        "model": "rational insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.13"
      },
      {
        "model": "infosphere biginsights",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.0.0"
      },
      {
        "model": "sterling connect:direct browser",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.2"
      },
      {
        "model": "system storage ts3310 tape library 641g",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0.16.0"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.11"
      },
      {
        "model": "db2 workgroup server edition fp6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "operations agent virtual appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "smartcloud entry fp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.19"
      },
      {
        "model": "runtimes for java technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "model": "asset manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.50"
      },
      {
        "model": "websphere service registry and repository",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3"
      },
      {
        "model": "security appscan standard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.8"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.4"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.2"
      },
      {
        "model": "db2 advanced workgroup server edition fp6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "msr (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "305)0"
      },
      {
        "model": "spectrum scale",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.0.0"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.8.1"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.010"
      },
      {
        "model": "optim performance manager for db2 on linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.1"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.0.10"
      },
      {
        "model": "infosphere optim performance manager for db2 on unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "tivoli system automation application manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1"
      },
      {
        "model": "f5000-c/s (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.6.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.5"
      },
      {
        "model": "optim performance manager for db2 on windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3.0.1"
      },
      {
        "model": "rational synergy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.4"
      },
      {
        "model": "rational doors next generation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0"
      },
      {
        "model": "websphere process server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "system m2 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x355079460"
      },
      {
        "model": "runtimes for java technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "idataplex dx360 m4 water cooled type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "79180"
      },
      {
        "model": "rational insight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.12"
      },
      {
        "model": "data server driver package",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.32"
      },
      {
        "model": "sparc enterprise m3000 xcp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1121"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.1"
      },
      {
        "model": "rational performance tester",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.7.0.2"
      },
      {
        "model": "system networking rackswitch g8316",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.3.3"
      },
      {
        "model": "netezza platform software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.213"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.5"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.26"
      },
      {
        "model": "jrockit r28.1.3",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1.1"
      },
      {
        "model": "rlks administration and reporting tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.4.4"
      },
      {
        "model": "(comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "59207)0"
      },
      {
        "model": "data server client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.2"
      },
      {
        "model": "sdk for node.js",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1.0.6"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.110"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.3"
      },
      {
        "model": "system type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x3690x571920"
      },
      {
        "model": "java sdk",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.0.0"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.6.0"
      },
      {
        "model": "operations manager for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.11"
      },
      {
        "model": "tivoli netcool configuration manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.0.6"
      },
      {
        "model": "rational doors next generation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.4"
      },
      {
        "model": "policy assessment and compliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.1"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0.1"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.023"
      },
      {
        "model": "oceanstor 18800f v100r001c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "virtual fabric 10gb switch module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.5"
      },
      {
        "model": "maximo asset management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50007.3"
      },
      {
        "model": "optim performance manager for db2 on windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.1"
      },
      {
        "model": "java sdk sr16-fp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6"
      },
      {
        "model": "ds8870 r7.3)",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "87.31.23.0("
      },
      {
        "model": "oceanstor v100r001c20spc200",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "18500"
      },
      {
        "model": "(comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "105005)0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.33"
      },
      {
        "model": "rational application developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.1"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.1.2"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0"
      },
      {
        "model": "tivoli netcool performance manager wireless",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.2"
      },
      {
        "model": "pureapplication system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.14"
      },
      {
        "model": "cloud manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.0.2"
      },
      {
        "model": "rational reporting for development intelligence",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.0"
      },
      {
        "model": "smartcloud orchestrator fp1 ifix4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.3"
      },
      {
        "model": "centos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "centos",
        "version": "7"
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4.1"
      },
      {
        "model": "flex system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.37"
      },
      {
        "model": "tivoli storage flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35007.3.0.12"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.12"
      },
      {
        "model": "hp-ux web server suite hpuxwsatw331",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hp",
        "version": "3.31"
      },
      {
        "model": "hp-ux php",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.2.17.04"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "websphere message broker",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.0.1"
      },
      {
        "model": "systems director storage control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.1.1"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.24"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.13"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1.1"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.2.178"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0"
      },
      {
        "model": "cloud manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.2"
      },
      {
        "model": "msr1000 (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.211"
      },
      {
        "model": "ultravr v100r003c00spc200",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "rlks administration and reporting tool",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1.4.8"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.5"
      },
      {
        "model": "jrockit r28.0.2",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "tivoli business service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.1"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.4"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.51"
      },
      {
        "model": "jre update9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "model": "java se embedded 7u40",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.2"
      },
      {
        "model": "systems director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.3.0"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.9"
      },
      {
        "model": "contactoptimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.3"
      },
      {
        "model": "infosphere information server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.14"
      },
      {
        "model": "web experience factory",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.5"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v70007.2.0.3"
      },
      {
        "model": "mq appliance m2000",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "sonas",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.0.0"
      },
      {
        "model": "websphere service registry and repository studio",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "systems director storage control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.2.3.2"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.5.1"
      },
      {
        "model": "netiq sentinel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "7.3.1"
      },
      {
        "model": "puredata system for analytics",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0"
      },
      {
        "model": "financial transaction manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1.1"
      },
      {
        "model": "data server driver for odbc and cli",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.8.05"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.2.6"
      },
      {
        "model": "smartcloud entry fix pack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.1.09"
      },
      {
        "model": "flex system chassis management module 2pet10f",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "cognos controller fp1 if1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "flex system compute node type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x24089560"
      },
      {
        "model": "java sdk sr8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.40"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.75"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.19"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.2"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37006.4.1.8"
      },
      {
        "model": "rational rhapsody design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.5"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0"
      },
      {
        "model": "tivoli storage flashcopy manager for vmware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.2.0"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.8.6"
      },
      {
        "model": "java sdk sr10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6"
      },
      {
        "model": "system networking rackswitch g8000",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.9.0"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.0"
      },
      {
        "model": "tivoli composite application manager for transactions",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.4.0.0"
      },
      {
        "model": "tivoli directory integrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.5.3"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.3"
      },
      {
        "model": "sonas",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.0.1"
      },
      {
        "model": "emptoris strategic supply management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.2.4"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.4.1"
      },
      {
        "model": "hp850 (comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5)0"
      },
      {
        "model": "abyp-2t-2s-0l-p-m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.1.9"
      },
      {
        "model": "bladecenter -h",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7989"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0.10.1"
      },
      {
        "model": "security network controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.3381"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "operations manager for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.20"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1"
      },
      {
        "model": "java sdk sr4-fp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.3.6"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "350.10"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35007.1.0.6"
      },
      {
        "model": "bladecenter -ht",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8740"
      },
      {
        "model": "flex system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.1.0"
      },
      {
        "model": "abyp-4ts-p",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "rational developer for power systems software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.01"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.0.34"
      },
      {
        "model": "security directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.1"
      },
      {
        "model": "data server driver package",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "operations agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.02"
      },
      {
        "model": "infosphere information server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "emptoris spend analysis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.22"
      },
      {
        "model": "cognos controller",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "system storage ts3310 tape library 630g",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "websphere service registry and repository studio",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "rational requirements composer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.4"
      },
      {
        "model": "infosphere optim performance manager for db2 on linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.3.1"
      },
      {
        "model": "linux arm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "security access manager for web",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.02"
      },
      {
        "model": "java sdk 7r1 sr2-fp10",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v50006.1"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.1"
      },
      {
        "model": "data server client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.4"
      },
      {
        "model": "centos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "centos",
        "version": "5"
      },
      {
        "model": "web experience factory",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.1"
      },
      {
        "model": "policy center v100r002c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.10"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.0"
      },
      {
        "model": "sterling control center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.2.1"
      },
      {
        "model": "rational developer for power systems software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.3"
      },
      {
        "model": "vios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2.1.8"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.8.1"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.1"
      },
      {
        "model": "rational service tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.26"
      },
      {
        "model": "endpoint manager for remote control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0.1"
      },
      {
        "model": "virtualization performance viewer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2.10"
      },
      {
        "model": "java sdk sr13-fp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.14"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.051"
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.01"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.3.0.6"
      },
      {
        "model": "content collector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.0.4"
      },
      {
        "model": "security identity manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "propel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2.10"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.1"
      },
      {
        "model": "s7700 v200r007c00spc500",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "system storage ts3310 tape library 660g",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "infosphere optim configuration manager for db2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.2"
      },
      {
        "model": "spss analytic server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.1"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "emptoris sourcing",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.0.1"
      },
      {
        "model": "rational team concert ifix5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.6"
      },
      {
        "model": "messagesight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.1"
      },
      {
        "model": "messagesight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.10"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.1"
      },
      {
        "model": "sterling connect:express for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.4"
      },
      {
        "model": "jrockit r28.2.7",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "rational directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.1"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.2"
      },
      {
        "model": "sterling connect:direct for microsoft windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.7"
      },
      {
        "model": "flashcopy manager for unix and linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.0"
      },
      {
        "model": "netiq sentinel build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "novell",
        "version": "8.0.0.03211"
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2"
      },
      {
        "model": "initiate master data service",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.711"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.11"
      },
      {
        "model": "flashcopy manager for unix and linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1.2"
      },
      {
        "model": "security identity manager virtual appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.1"
      },
      {
        "model": "java sdk 6r1 sr8",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "notes and domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.2"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.725"
      },
      {
        "model": "operational decision manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "mq light",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0"
      },
      {
        "model": "informix genero",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.40"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.9"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "jdk update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.7.051"
      },
      {
        "model": "gbesm 1g l2/7",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "21.0.22.0"
      },
      {
        "model": "rational synergy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.7.005"
      },
      {
        "model": "rational developer for power systems software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.61"
      },
      {
        "model": "system m4 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x375087520"
      },
      {
        "model": "security key lifecycle manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5"
      },
      {
        "model": "db2\u00ae workgroup server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1.2"
      },
      {
        "model": "java",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.1.0"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.33"
      },
      {
        "model": "rational performance tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.7"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.72"
      },
      {
        "model": "sterling connect:enterprise for unix ifix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.0.37"
      },
      {
        "model": "jre update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.031"
      },
      {
        "model": "installation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.0.0.5"
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "350.40"
      },
      {
        "model": "qradar siem patch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.43"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.18"
      },
      {
        "model": "layer gbesm",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2/35.3.7.0"
      },
      {
        "model": "db2\u00ae advanced enterprise server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.4.1.3"
      },
      {
        "model": "p6000 command view software",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.3.7"
      },
      {
        "model": "db2\u00ae connect? application server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "connect-it",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.51"
      },
      {
        "model": "tivoli storage productivity center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.2.4.1"
      },
      {
        "model": "sterling connect:express for unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.35"
      },
      {
        "model": "system networking rackswitch g8264",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.9.100"
      },
      {
        "model": "bladecenter -e",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8677"
      },
      {
        "model": "rational software architect realtime edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.4.2"
      },
      {
        "model": "predictiveinsight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.5"
      },
      {
        "model": "bsm connector",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.00"
      },
      {
        "model": "db2 enterprise server edition fp11",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.7"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.5"
      },
      {
        "model": "tivoli common reporting",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.1"
      },
      {
        "model": "emptoris strategic supply management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.0.2.6"
      },
      {
        "model": "emptoris contract management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.5.0.5"
      },
      {
        "model": "data ontap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.1"
      },
      {
        "model": "rational software architect for websphere software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.5.1"
      },
      {
        "model": "ara",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.5.2"
      },
      {
        "model": "rational business developer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "flex system chassis management module 2pet10d",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "flex system chassis management module 2pete5o",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "packaging utility",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.5.3"
      },
      {
        "model": "tivoli application dependency discovery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.2.0.1"
      },
      {
        "model": "business process manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.12"
      },
      {
        "model": "db2 connect application server edition fp6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.5"
      },
      {
        "model": "(comware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "59407)0"
      },
      {
        "model": "rational developer for aix and cobol",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1"
      },
      {
        "model": "propel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "1.11"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.9"
      },
      {
        "model": "buildforge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.0.0.1"
      },
      {
        "model": "system m2 type",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "x350078390"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1.4"
      },
      {
        "model": "flashcopy manager for oracle",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.0.0"
      },
      {
        "model": "predictiveinsight",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.1.1"
      },
      {
        "model": "websphere transformation extender",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.2.0.5"
      },
      {
        "model": "flashcopy manager for oracle",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.1.1.2"
      },
      {
        "model": "flex system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.3.3.0"
      },
      {
        "model": "websphere mq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.11"
      },
      {
        "model": "powervc express edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2.0.3"
      },
      {
        "model": "rational clearcase",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.1"
      },
      {
        "model": "jrockit r27.8.2",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "unstructured data identification and mgmt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.1"
      },
      {
        "model": "campaign",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "9.0"
      },
      {
        "model": "spss collaboration and deployment services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.0"
      },
      {
        "model": "infosphere information server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.7"
      },
      {
        "model": "operations agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.12"
      },
      {
        "model": "tivoli netcool/omnibus webgui",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.3"
      },
      {
        "model": "rational clearquest",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2.10"
      },
      {
        "model": "quidway s9300 v100r006c00b010",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "power systems",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "730.91"
      },
      {
        "model": "jrockit r28.2.5",
        "scope": null,
        "trust": 0.3,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": "rational doors next generation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0.7"
      },
      {
        "model": "abyp-2t-0s-2l-p-m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "0"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v37007.1"
      },
      {
        "model": "p6000 command view software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.3"
      },
      {
        "model": "rational tau",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.33"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.32"
      },
      {
        "model": "rational software architect design manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.0.1"
      },
      {
        "model": "emptoris spend analysis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.00"
      },
      {
        "model": "integration designer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5"
      },
      {
        "model": "rational developer for system z",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.5.1"
      },
      {
        "model": "storwize",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "v35007.2.0.8"
      },
      {
        "model": "infosphere biginsights",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.01"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.33"
      },
      {
        "model": "flashcopy manager for custom applications",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "3.2.0.0"
      },
      {
        "model": "db2\u00ae enterprise server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "10.1"
      },
      {
        "model": "rational requisitepro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.0.1"
      },
      {
        "model": "rational team concert",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.0"
      },
      {
        "model": "websphere business events",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.0.0.34"
      },
      {
        "model": "smartcloud orchestrator fp1 ifix7",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.3"
      },
      {
        "model": "rational software architect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.5.2"
      },
      {
        "model": "smartcloud provisioning fixpack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "2.31"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.4"
      },
      {
        "model": "rational build forge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1.2"
      },
      {
        "model": "websphere application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.010"
      },
      {
        "model": "oceanstor s6800t v200r002c10",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "qradar siem mr2 patch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.19"
      },
      {
        "model": "runtimes for java technology",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "7.1"
      },
      {
        "model": "rational functional tester",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "8.12"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "73684"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2808"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "HP",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "133274"
      },
      {
        "db": "PACKETSTORM",
        "id": "133344"
      },
      {
        "db": "PACKETSTORM",
        "id": "133366"
      },
      {
        "db": "PACKETSTORM",
        "id": "138866"
      },
      {
        "db": "PACKETSTORM",
        "id": "132345"
      },
      {
        "db": "PACKETSTORM",
        "id": "136248"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2015-2808",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2015-2808",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-80769",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-2808",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-80769",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-80769"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2808"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the \"Bar Mitzvah\" issue. The RC4 algorithm, as used in SSL/TLS is prone to a security weakness that may    allow attackers to recover plain-text. \nSuccessfully exploiting this issue in conjunction with other latent vulnerabilities may allow attackers to gain access to sensitive information that may aid in further attacks. RC4 is a stream encryption algorithm with variable key length developed by American software developer Ronald Rivest. The algorithm consists of a pseudo-random number generator and an XOR operation, and supports encryption and decryption using the same key. There is a security loophole in the RC4 algorithm used in the TLS protocol and the SSL protocol. The loophole stems from the fact that the program does not correctly combine state data and key data during the initialization phase. A remote attacker can exploit this vulnerability to perform a plaintext-recovery attack on the initialization bytes in the data stream by sniffing specific network traffic and then conducting a brute force attack. v9.1x, v9.2x, v10.0x\nHP Network Node Manager iSPI Performance for QA v9.0x, v9.1x, v9.2x, v10.0x\nHP Network Node Manager iSPI for IP Multicast QA v9.0x, v9.1x, v9.2x, v10.0x\nHP Network Node Manager iSPI for MPLS VPN v9.0x, v9.1x, v9.2x, v10.0x\nHP Network Node Manager iSPI for IP Telephony v9.0x, v9.1x, v9.2x, v10.0x\nHP Network Node Manager iSPI for NET v9.0x, v9.1x, v9.2x, v10.0x\nHP Network Node Manager iSPI Performance for Metrics v9.0x, v9.1x, v9.2x,\nv10.0x\nHP Network Node Manager iSPI Performance for Traffic v9.0x, v9.1x, v9.2x,\nv10.0x\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2015-4000    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2015-2808    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2015-0204    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following updates for HP Network Node Manager i and Smart\nPlugins (iSPIs)\n\nHP Network Node Manager i and Smart Plugins (iSPIs) Version\n Link to update for CVE-2015-4000 (LogJam)\n\nHP Network Node Manager i version v9.1x, v9.2x\niSPI Performance for QA\niSPI for IP Multicast\niSPI for MPLS VPN\niSPI for IP Telephony\n\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01704653\n\nHP Network Node Manager iSPI for Metrics v9.1x, v9.2x\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01740484\n\nHP Network Node Manager iSPI for Traffic v9.1x, v9.2x\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01740489\n\nNote: v10.x is not affected by LogJam\n\nHP Network Node Manager i and Smart Plugins (iSPIs) Version\n Link to update for CVE-2015-2808 (Bar Mitzvah)\n\nHP Network Node Manager i version v9.1x, v9.2x, v10.x\niSPI Performance for QA\niSPI for IP Multicast\niSPI for MPLS VPN\niSPI for IP Telephony\n\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01704651\n\nHP Network Node Manager iSPI for Metrics v9.1x, v9.2x, v10.0x\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01740486\n\nHP Network Node Manager iSPI for Traffic v9.1x, v9.2x, v10.0x\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01740487\n\nHP Network Node Manager i and Smart Plugins (iSPIs) Version\n Link to update for CVE-2015-0204 (Freak)\n\nHP Network Node Manager i version v9.x, v10.x\niSPI Performance for QA\niSPI for IP Multicast\niSPI for MPLS VPN\niSPI for IP Telephony\n\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01704633https://softwaresupport.hp.com/group/softwaresupport/\nsearch-result/-/facetsearch/document/KM01704633\n\nHP Network Node Manager iSPI for Metrics v9.1x, v9.2x\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01740481\n\nHP Network Node Manager iSPI for Traffic v9.1x, v9.2x\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/KM01740488\n\nNote: v10.x is not affected by FREAK\n\nHISTORY\nVersion:1 (rev.1) - 20 August 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \nHP Performance Manager v9.0x and v9.20. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201512-10\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: Mozilla Products: Multiple vulnerabilities\n     Date: December 30, 2015\n     Bugs: #545232, #554036, #556942, #564818, #568376\n       ID: 201512-10\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Mozilla Firefox and\nThunderbird, the worst of which may allow user-assisted execution of\narbitrary code. \n\nBackground\n==========\n\nMozilla Firefox is an open-source web browser and Mozilla Thunderbird\nan open-source email client, both from the Mozilla Project. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  www-client/firefox           \u003c 38.5.0                  \u003e= 38.5.0\n  2  www-client/firefox-bin       \u003c 38.5.0                  \u003e= 38.5.0\n  3  mail-client/thunderbird      \u003c 38.5.0                  \u003e= 38.5.0\n  4  mail-client/thunderbird-bin\n                                  \u003c 38.5.0                  \u003e= 38.5.0\n    -------------------------------------------------------------------\n     4 affected packages\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Mozilla Firefox and\nMozilla Thunderbird. Please review the CVE identifiers referenced below\nfor details. \n\nImpact\n======\n\nA remote attacker could entice a user to view a specially crafted web\npage or email, possibly resulting in execution of arbitrary code or a\nDenial of Service condition. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll  Firefox users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=www-client/firefox-38.5.0\"\n\nAll  Firefox-bin users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=www-client/firefox-bin-38.5.0\"\n\nAll  Thunderbird users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=mail-client/thunderbird-38.5.0\"=\n\n\nAll  Thunderbird-bin users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot -v \"\u003e=mail-client/thunderbird-bin-38.5.0\"\n\nReferences\n==========\n\n[  1 ] CVE-2015-0798\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0798\n[  2 ] CVE-2015-0799\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0799\n[  3 ] CVE-2015-0801\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0801\n[  4 ] CVE-2015-0802\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0802\n[  5 ] CVE-2015-0803\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0803\n[  6 ] CVE-2015-0804\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0804\n[  7 ] CVE-2015-0805\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0805\n[  8 ] CVE-2015-0806\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0806\n[  9 ] CVE-2015-0807\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0807\n[ 10 ] CVE-2015-0808\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0808\n[ 11 ] CVE-2015-0810\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0810\n[ 12 ] CVE-2015-0811\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0811\n[ 13 ] CVE-2015-0812\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0812\n[ 14 ] CVE-2015-0813\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0813\n[ 15 ] CVE-2015-0814\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0814\n[ 16 ] CVE-2015-0815\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0815\n[ 17 ] CVE-2015-0816\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0816\n[ 18 ] CVE-2015-2706\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2706\n[ 19 ] CVE-2015-2721\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721\n[ 20 ] CVE-2015-2722\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2722\n[ 21 ] CVE-2015-2724\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2724\n[ 22 ] CVE-2015-2725\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2725\n[ 23 ] CVE-2015-2726\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2726\n[ 24 ] CVE-2015-2727\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2727\n[ 25 ] CVE-2015-2728\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2728\n[ 26 ] CVE-2015-2729\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2729\n[ 27 ] CVE-2015-2730\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2730\n[ 28 ] CVE-2015-2731\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2731\n[ 29 ] CVE-2015-2733\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2733\n[ 30 ] CVE-2015-2734\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2734\n[ 31 ] CVE-2015-2735\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2735\n[ 32 ] CVE-2015-2736\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2736\n[ 33 ] CVE-2015-2737\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2737\n[ 34 ] CVE-2015-2738\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2738\n[ 35 ] CVE-2015-2739\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2739\n[ 36 ] CVE-2015-2740\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2740\n[ 37 ] CVE-2015-2741\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2741\n[ 38 ] CVE-2015-2742\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2742\n[ 39 ] CVE-2015-2743\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2743\n[ 40 ] CVE-2015-2808\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2808\n[ 41 ] CVE-2015-4000\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000\n[ 42 ] CVE-2015-4495\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4495\n[ 43 ] CVE-2015-4513\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4513\n[ 44 ] CVE-2015-4514\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4514\n[ 45 ] CVE-2015-4515\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4515\n[ 46 ] CVE-2015-4518\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4518\n[ 47 ] CVE-2015-7181\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181\n[ 48 ] CVE-2015-7182\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182\n[ 49 ] CVE-2015-7183\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183\n[ 50 ] CVE-2015-7187\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7187\n[ 51 ] CVE-2015-7188\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7188\n[ 52 ] CVE-2015-7189\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7189\n[ 53 ] CVE-2015-7191\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7191\n[ 54 ] CVE-2015-7192\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7192\n[ 55 ] CVE-2015-7193\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7193\n[ 56 ] CVE-2015-7194\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7194\n[ 57 ] CVE-2015-7195\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7195\n[ 58 ] CVE-2015-7196\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7196\n[ 59 ] CVE-2015-7197\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7197\n[ 60 ] CVE-2015-7198\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7198\n[ 61 ] CVE-2015-7199\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7199\n[ 62 ] CVE-2015-7200\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7200\n[ 63 ] CVE-2015-7201\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7201\n[ 64 ] CVE-2015-7202\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7202\n[ 65 ] CVE-2015-7203\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7203\n[ 66 ] CVE-2015-7204\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7204\n[ 67 ] CVE-2015-7205\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7205\n[ 68 ] CVE-2015-7207\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7207\n[ 69 ] CVE-2015-7208\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7208\n[ 70 ] CVE-2015-7210\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7210\n[ 71 ] CVE-2015-7211\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7211\n[ 72 ] CVE-2015-7212\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7212\n[ 73 ] CVE-2015-7213\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7213\n[ 74 ] CVE-2015-7214\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7214\n[ 75 ] CVE-2015-7215\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7215\n[ 76 ] CVE-2015-7216\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7216\n[ 77 ] CVE-2015-7217\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7217\n[ 78 ] CVE-2015-7218\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7218\n[ 79 ] CVE-2015-7219\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7219\n[ 80 ] CVE-2015-7220\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7220\n[ 81 ] CVE-2015-7221\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7221\n[ 82 ] CVE-2015-7222\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7222\n[ 83 ] CVE-2015-7223\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7223\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201512-10\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2015 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. These vulnerabilities could be exploited\nremotely resulting in disclosure of information and other impacts including:\n\n  - The MD5 Message-Digest Algorithm is not collision resistant, which makes\nit easier for context-dependent attackers to conduct spoofing attacks, as\ndemonstrated by attacks on the use of MD5 in the signature algorithm of an\nX.509 certificate. \n  - HPE iMC PLAT - Please refer to the RESOLUTION\n below for a list of impacted products. \n\n  + **iMC PLAT - Version: IMC PLAT 7.2, E0403P10**\n\n      - JD125A  HP IMC Std S/W Platform w/100-node\n      - JD126A  HP IMC Ent S/W Platform w/100-node\n      - JD808A  HP IMC Ent Platform w/100-node License\n      - JD814A   HP A-IMC Enterprise Edition Software DVD Media\n      - JD815A  HP IMC Std Platform w/100-node License\n      - JD816A  HP A-IMC Standard Edition Software DVD Media\n      - JF288AAE  HP Network Director to Intelligent Management Center\nUpgrade E-LTU\n      - JF289AAE  HP Enterprise Management System to Intelligent Management\nCenter Upgrade E-LTU\n      - JF377A  HP IMC Std S/W Platform w/100-node Lic\n      - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU\n      - JF378A  HP IMC Ent S/W Platform w/200-node Lic\n      - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU\n      - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU\n      - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU\n      - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU\n      - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU\n      - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU\n      - JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade\n50-node and 150-AP E-LTU\n      - JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point\nE-LTU\n      - JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance\nEdition E-LTU\n      - JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU\n      - JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance\nEdition E-LTU\n      - JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with\n200-node E-LTU\n\n**Note:** Please contact HPE Technical Support if any assistance is needed\nacquiring the software updates. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04832246\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04832246\nVersion: 1\n\nHPSBUX03512 SSRT102254 rev.1 - HP-UX Web Server Suite running Apache, Remote\nDenial of Service (DoS) and Other Vulnerabilities\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2015-10-15\nLast Updated: 2015-10-15\n\nPotential Security Impact: Remote Denial of Service (DoS), access restriction\nbypass, unauthorized modification, disclosure of information, local access\nrestriction bypass\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP-UX Web Server\nSuite running Apache. These vulnerabilities could be exploited remotely to\ncreate a Denial of Service (DoS) and other impacts including... \n\n  - The TLS vulnerability using US export-grade 512-bit keys in\nDiffie-Hellman key exchange known as \"Logjam\" could be exploited remotely to\nallow unauthorized modification. \n  - The RC4 stream cipher vulnerability in SSL/TLS known as \"Bar Mitzvah\"\ncould be exploited remotely to allow disclosure of information. \n\nReferences:\n\nCVE-2013-5704\nCVE-2014-0118\nCVE-2014-0226\nCVE-2014-0231\nCVE-2015-3183\nCVE-2015-4000 - \"Logjam\"\nCVE-2015-2808 - \"Bar Mitzvah\"\nSSRT102254\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX Web Server Suite 2.2.15.21 Apache\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2013-5704    (AV:N/AC:L/Au:N/C:N/I:P/A:N)       5.0\nCVE-2014-0118    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2014-0226    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-0231    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-3183    (AV:N/AC:L/Au:N/C:N/I:P/A:N)       5.0\nCVE-2015-4000    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3\nCVE-2015-2808    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following software updates to resolve the vulnerabilities\nwith HP-UX Web Server Suite running Apache. \n\n  The updates are available for download from http://software.hp.com\n\n  NOTE: HP-UX Web Server Suite v3.31 HPUXWSATW331 contains the following\ncomponents:\n\n    - Apache v2.2.15.23\n    - Tomcat Servlet Engine 5.5.36.02\n    - PHP 5.2.17.04\n\n  HP-UX 11i Release\n   Apache Depot name\n\n  B.11.23 (11i v2 32-bit)\n   HP_UX_11.23_HP_UX_11.23_HPUXWS22ATW-B331-11-23-32.depot\n\n  B.11.23 (11i v2 64-bit)\n   HP_UX_11.23_HP_UX_11.23_HPUXWS22ATW-B331-11-23-64.depot\n\nMANUAL ACTIONS: Yes - Update\nDownload and install the software update\n\nPRODUCT SPECIFIC INFORMATION\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.23\n=============\nhpuxws22APACHE32.APACHE\nhpuxws22APACHE32.APACHE2\nhpuxws22APACHE32.AUTH_LDAP\nhpuxws22APACHE32.AUTH_LDAP2\nhpuxws22APACHE32.MOD_JK\nhpuxws22APACHE32.MOD_JK2\nhpuxws22APACHE32.MOD_PERL\nhpuxws22APACHE32.MOD_PERL2\nhpuxws22APACHE32.PHP\nhpuxws22APACHE32.PHP2\nhpuxws22APACHE32.WEBPROXY\nhpuxws22APACHE32.WEBPROXY2\nhpuxws22APACHE.APACHE\nhpuxws22APACHE.APACHE2\nhpuxws22APACHE.AUTH_LDAP\nhpuxws22APACHE.AUTH_LDAP2\nhpuxws22APACHE.MOD_JK\nhpuxws22APACHE.MOD_JK2\nhpuxws22APACHE.MOD_PERL\nhpuxws22APACHE.MOD_PERL2\nhpuxws22APACHE.PHP\nhpuxws22APACHE.PHP2\nhpuxws22APACHE.WEBPROXY\nhpuxws22APACHE.WEBPROXY2\naction: install revision B.2.2.15.18 or subsequent\n\nhpuxws22TOMCAT32.TOMCAT\nhpuxws22TOMCAT.TOMCAT\naction: install revision C.6.0.35.01 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 15 October 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch Update Advisory page, listed in the References section. Customers unable to apply the update should contact\nHPE Support to discuss options. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Critical: java-1.7.0-openjdk security update\nAdvisory ID:       RHSA-2015:1229-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2015-1229.html\nIssue date:        2015-07-15\nCVE Names:         CVE-2015-2590 CVE-2015-2601 CVE-2015-2621 \n                   CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 \n                   CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 \n                   CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 \n                   CVE-2015-4749 CVE-2015-4760 \n=====================================================================\n\n1. Summary:\n\nUpdated java-1.7.0-openjdk packages that fix multiple security issues are\nnow available for Red Hat Enterprise Linux 6 and 7. \n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64\n\n3. Description:\n\nThe java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime\nEnvironment and the OpenJDK 7 Java Software Development Kit. \n\nMultiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI\ncomponents in OpenJDK. An untrusted Java application or applet could use\nthese flaws to bypass Java sandbox restrictions. (CVE-2015-4760,\nCVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733)\n\nA flaw was found in the way the Libraries component of OpenJDK verified\nOnline Certificate Status Protocol (OCSP) responses. An OCSP response with\nno nextUpdate date specified was incorrectly handled as having unlimited\nvalidity, possibly causing a revoked X.509 certificate to be interpreted as\nvalid. (CVE-2015-4748)\n\nIt was discovered that the JCE component in OpenJDK failed to use constant\ntime comparisons in multiple cases. An attacker could possibly use these\nflaws to disclose sensitive information by measuring the time used to\nperform operations using these non-constant time comparisons. \n(CVE-2015-2601)\n\nA flaw was found in the RC4 encryption algorithm. When using certain keys\nfor RC4 encryption, an attacker could obtain portions of the plain text\nfrom the cipher text without the knowledge of the encryption key. \n(CVE-2015-2808)\n\nNote: With this update, OpenJDK now disables RC4 TLS/SSL cipher suites by\ndefault to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug\n1207101, linked to in the References section, for additional details about\nthis change. \n\nA flaw was found in the way the TLS protocol composed the Diffie-Hellman\n(DH) key exchange. A man-in-the-middle attacker could use this flaw to\nforce the use of weak 512 bit export-grade keys during the key exchange,\nallowing them do decrypt all traffic. (CVE-2015-4000)\n\nNote: This update forces the TLS/SSL client implementation in OpenJDK to\nreject DH key sizes below 768 bits, which prevents sessions to be\ndowngraded to export-grade keys. Refer to Red Hat Bugzilla bug 1223211,\nlinked to in the References section, for additional details about this\nchange. \n\nIt was discovered that the JNDI component in OpenJDK did not handle DNS\nresolutions correctly. An attacker able to trigger such DNS errors could\ncause a Java application using JNDI to consume memory and CPU time, and\npossibly block further DNS resolution. (CVE-2015-4749)\n\nMultiple information leak flaws were found in the JMX and 2D components in\nOpenJDK. An untrusted Java application or applet could use this flaw to\nbypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632)\n\nA flaw was found in the way the JSSE component in OpenJDK performed X.509\ncertificate identity verification when establishing a TLS/SSL connection to\na host identified by an IP address. In certain cases, the certificate was\naccepted as valid if it was issued for a host name to which the IP address\nresolves rather than for the IP address. (CVE-2015-2625)\n\nNote: If the web browser plug-in provided by the icedtea-web package was\ninstalled, the issues exposed via Java applets could have been exploited\nwithout user interaction if a user visited a malicious website. \n\nAll users of java-1.7.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1207101 - CVE-2015-2808 SSL/TLS: \"Invariance Weakness\" vulnerability in RC4 stream cipher\n1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks\n1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694)\n1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865)\n1242232 - CVE-2015-2628 OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376)\n1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397)\n1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405)\n1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409)\n1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374)\n1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853)\n1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378)\n1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520)\n1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)\n1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401)\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm\n\nppc64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\n\ns390x:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.ael7b_1.src.rpm\n\nppc64le:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm\n\nppc64:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm\n\ns390x:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.s390x.rpm\n\nx86_64:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.ael7b_1.noarch.rpm\n\nppc64le:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-2590\nhttps://access.redhat.com/security/cve/CVE-2015-2601\nhttps://access.redhat.com/security/cve/CVE-2015-2621\nhttps://access.redhat.com/security/cve/CVE-2015-2625\nhttps://access.redhat.com/security/cve/CVE-2015-2628\nhttps://access.redhat.com/security/cve/CVE-2015-2632\nhttps://access.redhat.com/security/cve/CVE-2015-2808\nhttps://access.redhat.com/security/cve/CVE-2015-4000\nhttps://access.redhat.com/security/cve/CVE-2015-4731\nhttps://access.redhat.com/security/cve/CVE-2015-4732\nhttps://access.redhat.com/security/cve/CVE-2015-4733\nhttps://access.redhat.com/security/cve/CVE-2015-4748\nhttps://access.redhat.com/security/cve/CVE-2015-4749\nhttps://access.redhat.com/security/cve/CVE-2015-4760\nhttps://access.redhat.com/security/updates/classification/#critical\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFVpliAXlSAg2UNWIIRAmDIAKC0SKJPEBiUrI0sgDcQMZTM/nm7nwCfUIje\nQU57Hj/UGZeY+OmKchPFPcI=\n=miFC\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-2808"
      },
      {
        "db": "BID",
        "id": "73684"
      },
      {
        "db": "VULHUB",
        "id": "VHN-80769"
      },
      {
        "db": "PACKETSTORM",
        "id": "133274"
      },
      {
        "db": "PACKETSTORM",
        "id": "133234"
      },
      {
        "db": "PACKETSTORM",
        "id": "133344"
      },
      {
        "db": "PACKETSTORM",
        "id": "135088"
      },
      {
        "db": "PACKETSTORM",
        "id": "133366"
      },
      {
        "db": "PACKETSTORM",
        "id": "138866"
      },
      {
        "db": "PACKETSTORM",
        "id": "132729"
      },
      {
        "db": "PACKETSTORM",
        "id": "133990"
      },
      {
        "db": "PACKETSTORM",
        "id": "132728"
      },
      {
        "db": "PACKETSTORM",
        "id": "132345"
      },
      {
        "db": "PACKETSTORM",
        "id": "136248"
      },
      {
        "db": "PACKETSTORM",
        "id": "132697"
      }
    ],
    "trust": 2.34
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-80769",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-80769"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-2808",
        "trust": 2.6
      },
      {
        "db": "BID",
        "id": "73684",
        "trust": 1.4
      },
      {
        "db": "JUNIPER",
        "id": "JSA10783",
        "trust": 1.4
      },
      {
        "db": "BID",
        "id": "91787",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1032788",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1033737",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1032734",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1033432",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1033071",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1036222",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1032708",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1032868",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1032990",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1033072",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1032910",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1032858",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1032600",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1032599",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1032707",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1033386",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1033415",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1033431",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1033769",
        "trust": 1.1
      },
      {
        "db": "JUNIPER",
        "id": "JSA10705",
        "trust": 1.1
      },
      {
        "db": "JUNIPER",
        "id": "JSA10727",
        "trust": 1.1
      },
      {
        "db": "MCAFEE",
        "id": "SB10163",
        "trust": 1.1
      },
      {
        "db": "PACKETSTORM",
        "id": "133344",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "133366",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "136248",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "132345",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "132872",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "132592",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "133330",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "133337",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "133392",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "132890",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "133336",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "132891",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "133329",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "133391",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "132753",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "137746",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "135172",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "136773",
        "trust": 0.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-654",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-80769",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "133274",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "133234",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "135088",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "138866",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "132729",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "133990",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "132728",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "132697",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-80769"
      },
      {
        "db": "BID",
        "id": "73684"
      },
      {
        "db": "PACKETSTORM",
        "id": "133274"
      },
      {
        "db": "PACKETSTORM",
        "id": "133234"
      },
      {
        "db": "PACKETSTORM",
        "id": "133344"
      },
      {
        "db": "PACKETSTORM",
        "id": "135088"
      },
      {
        "db": "PACKETSTORM",
        "id": "133366"
      },
      {
        "db": "PACKETSTORM",
        "id": "138866"
      },
      {
        "db": "PACKETSTORM",
        "id": "132729"
      },
      {
        "db": "PACKETSTORM",
        "id": "133990"
      },
      {
        "db": "PACKETSTORM",
        "id": "132728"
      },
      {
        "db": "PACKETSTORM",
        "id": "132345"
      },
      {
        "db": "PACKETSTORM",
        "id": "136248"
      },
      {
        "db": "PACKETSTORM",
        "id": "132697"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2808"
      }
    ]
  },
  "id": "VAR-201504-0247",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-80769"
      }
    ],
    "trust": 0.7700035949999998
  },
  "last_update_date": "2024-11-29T19:56:33.122000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-327",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-310",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-80769"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2808"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.5,
        "url": "http://rhn.redhat.com/errata/rhsa-2015-1229.html"
      },
      {
        "trust": 1.5,
        "url": "http://rhn.redhat.com/errata/rhsa-2015-1242.html"
      },
      {
        "trust": 1.5,
        "url": "http://rhn.redhat.com/errata/rhsa-2015-1243.html"
      },
      {
        "trust": 1.4,
        "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04779034"
      },
      {
        "trust": 1.4,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640"
      },
      {
        "trust": 1.4,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
      },
      {
        "trust": 1.4,
        "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
      },
      {
        "trust": 1.4,
        "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098709"
      },
      {
        "trust": 1.4,
        "url": "https://www.blackhat.com/docs/asia-15/materials/asia-15-mantin-bar-mitzvah-attack-breaking-ssl-with-13-year-old-rc4-weakness-wp.pdf"
      },
      {
        "trust": 1.4,
        "url": "http://rhn.redhat.com/errata/rhsa-2015-1007.html"
      },
      {
        "trust": 1.4,
        "url": "http://rhn.redhat.com/errata/rhsa-2015-1020.html"
      },
      {
        "trust": 1.4,
        "url": "http://rhn.redhat.com/errata/rhsa-2015-1228.html"
      },
      {
        "trust": 1.4,
        "url": "http://rhn.redhat.com/errata/rhsa-2015-1230.html"
      },
      {
        "trust": 1.4,
        "url": "http://rhn.redhat.com/errata/rhsa-2015-1241.html"
      },
      {
        "trust": 1.2,
        "url": "https://security.gentoo.org/glsa/201512-10"
      },
      {
        "trust": 1.1,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iv71888"
      },
      {
        "trust": 1.1,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iv71892"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/73684"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/91787"
      },
      {
        "trust": 1.1,
        "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565"
      },
      {
        "trust": 1.1,
        "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960015"
      },
      {
        "trust": 1.1,
        "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769"
      },
      {
        "trust": 1.1,
        "url": "http://www.huawei.com/en/psirt/security-advisories/hw-454055"
      },
      {
        "trust": 1.1,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
      },
      {
        "trust": 1.1,
        "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm"
      },
      {
        "trust": 1.1,
        "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04770140"
      },
      {
        "trust": 1.1,
        "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04772190"
      },
      {
        "trust": 1.1,
        "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773119"
      },
      {
        "trust": 1.1,
        "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773241"
      },
      {
        "trust": 1.1,
        "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773256"
      },
      {
        "trust": 1.1,
        "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04832246"
      },
      {
        "trust": 1.1,
        "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04926789"
      },
      {
        "trust": 1.1,
        "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04708650"
      },
      {
        "trust": 1.1,
        "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04711380"
      },
      {
        "trust": 1.1,
        "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05085988"
      },
      {
        "trust": 1.1,
        "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05193347"
      },
      {
        "trust": 1.1,
        "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05289935"
      },
      {
        "trust": 1.1,
        "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05336888"
      },
      {
        "trust": 1.1,
        "url": "https://kb.juniper.net/jsa10783"
      },
      {
        "trust": 1.1,
        "url": "http://www.debian.org/security/2015/dsa-3316"
      },
      {
        "trust": 1.1,
        "url": "http://www.debian.org/security/2015/dsa-3339"
      },
      {
        "trust": 1.1,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04687922"
      },
      {
        "trust": 1.1,
        "url": "http://rhn.redhat.com/errata/rhsa-2015-1006.html"
      },
      {
        "trust": 1.1,
        "url": "http://rhn.redhat.com/errata/rhsa-2015-1021.html"
      },
      {
        "trust": 1.1,
        "url": "http://rhn.redhat.com/errata/rhsa-2015-1091.html"
      },
      {
        "trust": 1.1,
        "url": "http://rhn.redhat.com/errata/rhsa-2015-1526.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1032599"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1032600"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1032707"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1032708"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1032734"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1032788"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1032858"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1032868"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1032910"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1032990"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1033071"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1033072"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1033386"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1033415"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1033431"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1033432"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1033737"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1033769"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1036222"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.ubuntu.com/usn/usn-2696-1"
      },
      {
        "trust": 1.1,
        "url": "http://www.ubuntu.com/usn/usn-2706-1"
      },
      {
        "trust": 1.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2808"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=144060606031437\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=144060576831314\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10705"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=143456209711959\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=144102017024820\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=144043644216842\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=144069189622016\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=144104533800819\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=144059703728085\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/"
      },
      {
        "trust": 1.0,
        "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10727"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=144059660127919\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=144104565600964\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=143629696317098\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10163"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4000"
      },
      {
        "trust": 0.5,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/"
      },
      {
        "trust": 0.5,
        "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins"
      },
      {
        "trust": 0.4,
        "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4732"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4748"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2628"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2632"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4733"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4749"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2625"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4760"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2601"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2621"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4731"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2590"
      },
      {
        "trust": 0.3,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207101"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/bugtraq/2015/aug/158"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/bugtraq/2015/jun/93"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/bugtraq/2015/jul/37"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/bugtraq/2015/jul/97"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/bugtraq/2016/mar/109"
      },
      {
        "trust": 0.3,
        "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10783\u0026cat=sirt_1\u0026actp=list"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/bugtraq/2015/jul/140"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/bugtraq/2015/jul/131"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/bugtraq/2015/jul/138"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04711380"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04767175"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04772190"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04773256"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04773004"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04777195"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04777255"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05193347"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05347541"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05336888"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04770140"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04926789"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04832246"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022548"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022550"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020690"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020715"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1005196"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1005197"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005199"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1005210"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1005212"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1005319 "
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005334"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21700896"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21701114"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21701358"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21701359"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21701548"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21701559"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701600"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21701612"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701640"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21701904"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701967"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701969"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21702170"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21702796"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21702801"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21702821"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21703436"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21708278"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21713608"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21713636"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21713646"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21713652"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21715538"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21715543"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21717865"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21717865"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21719390"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21720186"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21720187"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21722402"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21722406"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21875279"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882551"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882579"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882645"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21882684"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21882689"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882706"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882778"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882825"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21882888"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882901"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21882969"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882999"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21883226"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883250"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21883260"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902260"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902369"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902541"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902697"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21902774"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902891"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903565"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21903800"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903805"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959069"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21959252"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960151"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960528"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960634"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963126"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963451"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21963526"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21964496"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21964610"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21964625"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21964730"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21964808"
      },
      {
        "trust": 0.3,
        "url": "http://aix.software.ibm.com/aix/efixes/security/java_april2015_advisory.asc"
      },
      {
        "trust": 0.3,
        "url": "http://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960515"
      },
      {
        "trust": 0.3,
        "url": "https://downloads.avaya.com/css/p8/documents/101012625"
      },
      {
        "trust": 0.3,
        "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098822"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902444"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902710"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960711"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21957999"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959525"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965448"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903747"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21957855"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21959575"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020751"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963024"
      },
      {
        "trust": 0.3,
        "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-454055.htm"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883122"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903636"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959577"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com/support/docview.wss?uid=swg21903752"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21964676"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963783"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005351"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963964"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903396"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697181"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960659"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21967539"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903541"
      },
      {
        "trust": 0.3,
        "url": "www-01.ibm.com/support/docview.wss?uid=swg21960815"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960248"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903029"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21957813"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902986"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965485"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21964027"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903651"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883583"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701483"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883582"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21958017"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903247"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903256"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903516"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965920"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21961223"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903031"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965404"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962552"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21958919"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962214"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21958918"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962216"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965553"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21957919"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962838"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962837"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960075"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902765"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902862"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902866"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959306"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698837"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903394"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21957779"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21964236"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21957995"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020752"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882717"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902374"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883253"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883258"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883731"
      },
      {
        "trust": 0.3,
        "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097737"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965555"
      },
      {
        "trust": 0.3,
        "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097608"
      },
      {
        "trust": 0.3,
        "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098303"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022181"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883682"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883588"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902568"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?rs=86\u0026uid=swg21883521"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882844"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883077"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883065"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883852"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005217"
      },
      {
        "trust": 0.3,
        "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098314"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883839"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882648"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882642"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882974"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902627"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005391"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902300"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883879"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883880"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883853"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883359"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902385"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902389"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883725"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700442"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21884071"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022190"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883453"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882577"
      },
      {
        "trust": 0.3,
        "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098302"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21903393"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902793"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883223"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701115"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883755"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883324"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882751"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882749"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883604"
      },
      {
        "trust": 0.3,
        "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097676"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883551"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883878"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005218"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883618"
      },
      {
        "trust": 0.3,
        "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099140"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883125"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022274"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882902"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882527"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882846"
      },
      {
        "trust": 0.3,
        "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097660"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883505"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883073"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960015"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883825"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883692"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21902107"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883666"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883191"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21702144"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883440"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883397"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883255"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883309"
      },
      {
        "trust": 0.3,
        "url": "https://download.novell.com/download?buildid=f5vvkpif5dk~"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005273"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005374"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005377"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005448"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1009336"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960460"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21961009"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962676"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965041"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965940"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21966452"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21967498"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21967709"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21967962"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21968485"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21970056"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21970847"
      },
      {
        "trust": 0.3,
        "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098474"
      },
      {
        "trust": 0.3,
        "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21883553"
      },
      {
        "trust": 0.3,
        "url": "www-01.ibm.com/support/docview.wss?uid=ssg1s1005231"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005230"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005278"
      },
      {
        "trust": 0.3,
        "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098183"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-4760"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-2621"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-2601"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-4732"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-2632"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-4000"
      },
      {
        "trust": 0.3,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11"
      },
      {
        "trust": 0.3,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-4733"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.3,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-4748"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-4731"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-2625"
      },
      {
        "trust": 0.3,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-4749"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-2808"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-2590"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2015-2628"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2613"
      },
      {
        "trust": 0.2,
        "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea"
      },
      {
        "trust": 0.2,
        "url": "http://www.hpe.com/support/security_bulletin_archive"
      },
      {
        "trust": 0.2,
        "url": "http://www.hpe.com/support/subscriber_choice"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2015-2664"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2627"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2637"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2638"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2015-2638"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2015-2627"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2664"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2015-2637"
      },
      {
        "trust": 0.2,
        "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#appendixjava"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/updates/classification/#critical"
      },
      {
        "trust": 0.1,
        "url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10705"
      },
      {
        "trust": 0.1,
        "url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10727"
      },
      {
        "trust": 0.1,
        "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10163"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=143456209711959\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=143629696317098\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=143818140118771\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=143817899717054\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=143817021313142\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=144060576831314\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=144069189622016\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=144104565600964\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=144060606031437\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=144102017024820\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=144059660127919\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=144059703728085\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=144043644216842\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=143741441012338\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=144104533800819\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=144493176821532\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0204"
      },
      {
        "trust": 0.1,
        "url": "https://softwaresupport.hp.com/group/softwaresupport/"
      },
      {
        "trust": 0.1,
        "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/fa"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0810"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2730"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7204"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0803"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0802"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0801"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0805"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0812"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7223"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7182"
      },
      {
        "trust": 0.1,
        "url": "https://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7193"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2721"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7219"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2729"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4495"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7216"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0802"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2743"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4518"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2808"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7181"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2737"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2733"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2739"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2726"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7215"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0806"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0814"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7195"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7208"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7199"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0808"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7187"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7183"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7207"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0804"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0801"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0807"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2724"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2735"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0805"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0799"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2724"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7201"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7218"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7200"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7192"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7196"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4513"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7203"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2721"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2728"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7197"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0816"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2731"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0810"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7205"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7194"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7211"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2730"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7221"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7217"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2742"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7191"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0812"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0811"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7212"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0813"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7188"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7189"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7210"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7202"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7220"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0799"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4515"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2736"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7214"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4514"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2729"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2738"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7198"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0815"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2740"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2728"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0811"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4000"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0813"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0798"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2726"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7222"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2727"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0798"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2725"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2706"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2734"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2741"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0804"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0806"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0808"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0815"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2706"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2727"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0816"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2725"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2731"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0807"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2722"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2722"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0803"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7213"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0814"
      },
      {
        "trust": 0.1,
        "url": "https://www.hpe.com/info/report-security-vulnerability"
      },
      {
        "trust": 0.1,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05289935"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2566"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2004-2761"
      },
      {
        "trust": 0.1,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3183"
      },
      {
        "trust": 0.1,
        "url": "http://software.hp.com"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0118"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0231"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0226"
      },
      {
        "trust": 0.1,
        "url": "https://www.hp.com/go/swa"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5704"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2619"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2015-2613"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4729"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2015-4736"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4736"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2015-4729"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2596"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2015-2619"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2015-2596"
      },
      {
        "trust": 0.1,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/"
      },
      {
        "trust": 0.1,
        "url": "https://softwaresupport.hp.com/group/softwaresupport/search-"
      },
      {
        "trust": 0.1,
        "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-80769"
      },
      {
        "db": "BID",
        "id": "73684"
      },
      {
        "db": "PACKETSTORM",
        "id": "133274"
      },
      {
        "db": "PACKETSTORM",
        "id": "133234"
      },
      {
        "db": "PACKETSTORM",
        "id": "133344"
      },
      {
        "db": "PACKETSTORM",
        "id": "135088"
      },
      {
        "db": "PACKETSTORM",
        "id": "133366"
      },
      {
        "db": "PACKETSTORM",
        "id": "138866"
      },
      {
        "db": "PACKETSTORM",
        "id": "132729"
      },
      {
        "db": "PACKETSTORM",
        "id": "133990"
      },
      {
        "db": "PACKETSTORM",
        "id": "132728"
      },
      {
        "db": "PACKETSTORM",
        "id": "132345"
      },
      {
        "db": "PACKETSTORM",
        "id": "136248"
      },
      {
        "db": "PACKETSTORM",
        "id": "132697"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2808"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-80769"
      },
      {
        "db": "BID",
        "id": "73684"
      },
      {
        "db": "PACKETSTORM",
        "id": "133274"
      },
      {
        "db": "PACKETSTORM",
        "id": "133234"
      },
      {
        "db": "PACKETSTORM",
        "id": "133344"
      },
      {
        "db": "PACKETSTORM",
        "id": "135088"
      },
      {
        "db": "PACKETSTORM",
        "id": "133366"
      },
      {
        "db": "PACKETSTORM",
        "id": "138866"
      },
      {
        "db": "PACKETSTORM",
        "id": "132729"
      },
      {
        "db": "PACKETSTORM",
        "id": "133990"
      },
      {
        "db": "PACKETSTORM",
        "id": "132728"
      },
      {
        "db": "PACKETSTORM",
        "id": "132345"
      },
      {
        "db": "PACKETSTORM",
        "id": "136248"
      },
      {
        "db": "PACKETSTORM",
        "id": "132697"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-2808"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-04-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-80769"
      },
      {
        "date": "2015-03-31T00:00:00",
        "db": "BID",
        "id": "73684"
      },
      {
        "date": "2015-08-24T22:05:27",
        "db": "PACKETSTORM",
        "id": "133274"
      },
      {
        "date": "2015-08-21T16:58:35",
        "db": "PACKETSTORM",
        "id": "133234"
      },
      {
        "date": "2015-08-27T13:19:00",
        "db": "PACKETSTORM",
        "id": "133344"
      },
      {
        "date": "2015-12-30T16:38:58",
        "db": "PACKETSTORM",
        "id": "135088"
      },
      {
        "date": "2015-08-28T19:22:00",
        "db": "PACKETSTORM",
        "id": "133366"
      },
      {
        "date": "2016-09-27T13:59:31",
        "db": "PACKETSTORM",
        "id": "138866"
      },
      {
        "date": "2015-07-17T19:49:52",
        "db": "PACKETSTORM",
        "id": "132729"
      },
      {
        "date": "2015-10-16T01:44:08",
        "db": "PACKETSTORM",
        "id": "133990"
      },
      {
        "date": "2015-07-17T19:49:22",
        "db": "PACKETSTORM",
        "id": "132728"
      },
      {
        "date": "2015-06-17T23:50:12",
        "db": "PACKETSTORM",
        "id": "132345"
      },
      {
        "date": "2016-03-15T13:14:00",
        "db": "PACKETSTORM",
        "id": "136248"
      },
      {
        "date": "2015-07-16T17:45:29",
        "db": "PACKETSTORM",
        "id": "132697"
      },
      {
        "date": "2015-04-01T02:00:35.097000",
        "db": "NVD",
        "id": "CVE-2015-2808"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-01-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-80769"
      },
      {
        "date": "2018-09-26T07:00:00",
        "db": "BID",
        "id": "73684"
      },
      {
        "date": "2024-11-21T02:28:07.190000",
        "db": "NVD",
        "id": "CVE-2015-2808"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "73684"
      }
    ],
    "trust": 0.3
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SSL/TLS RC4 CVE-2015-2808 Information Disclosure Weakness",
    "sources": [
      {
        "db": "BID",
        "id": "73684"
      }
    ],
    "trust": 0.3
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "73684"
      }
    ],
    "trust": 0.3
  }
}

var-202007-0473
Vulnerability from variot

The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en. plural Huawei The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0473",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01spc300"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc700"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc400t"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03b013sp02"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc201b023t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc203t"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd04t"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10spc300"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03b012sp16"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc101tb015"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc800t"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph309"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc300t"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc100"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "te50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc405t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc200"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc900"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph309"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc200b022t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd05t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc700"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcf00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900t"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spce01t"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc200"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc200"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd03t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcc00"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc502"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd02t"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc102"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcb00"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc100"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc700"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc100"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc700t"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c02spc200"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc001t"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc800"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc101"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca00t"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc100"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc103t"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03lgwl01spc100"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc100"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c00"
      },
      {
        "model": "usg9520",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spc800pwe"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c17"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc104t"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc700"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcj00"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "nip6800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc201t"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc400"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc403t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc300"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "semg9811",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spca00"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00spc300t"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc402t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600t"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc180t"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd01t"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc202b025t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc900"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc700"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spca00"
      },
      {
        "model": "nip6800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc204t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc201t"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc400"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc600"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20lcrw01t"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01spc500"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc400"
      },
      {
        "model": "semg9811",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spc700"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc702t"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc400"
      },
      {
        "model": "svn5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "tp3206",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r002c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc700"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc600"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c02spc100"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc300"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc200"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc500"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c11"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "svn5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc300"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03b012sp15"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph309"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spch00"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc200"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00spc500"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc400b001"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc102t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc203t"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcg00"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc700"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc200"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c10"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc500"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc800"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "te50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500t"
      },
      {
        "model": "svn5600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc103"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb00"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00spc200"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcd00t"
      },
      {
        "model": "te50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar3600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc703t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc206t"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c01spc500t"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c01spc100"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc500"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc901t"
      },
      {
        "model": "svn5600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spcb00"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03b015sp03"
      },
      {
        "model": "svn5800-c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc800"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc600"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01spc600"
      },
      {
        "model": "dp300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00spc200t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc208t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca02t"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc207t"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "svn5800-c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00spc301t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc400"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03b013sp04"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10t"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc500"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc800"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca01t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc206t"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spci00"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c15"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spca00"
      },
      {
        "model": "rse6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc300"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spca01"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01sph703"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10spc100t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc400"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spcc00"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03spc100"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "semg9811",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spc500"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc100b015t"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16pwe"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc800"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00spc101b001t"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc900"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spcb00"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10spc100"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c02spc300"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c02spc100"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03b013sp03"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph702"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcb01t"
      },
      {
        "model": "usg9560",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c20spc300"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc209t"
      },
      {
        "model": "viewpoint 8660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r008c03spc300"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r011c03lgwl01spc100b012"
      },
      {
        "model": "secospace usg6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc100"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spcd00"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc300"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc205t"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c01spc500"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01spc400"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spca00"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "semg9811",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r001c01spc500t"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00spc900"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc600"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc500"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc404t"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc600"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc400"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20sph703"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc600"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20spc300"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc701t"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spcc00"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spc401t"
      },
      {
        "model": "vp9660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c30spce00"
      },
      {
        "model": "ar120-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015761"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19417"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:ar120-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar1200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar1200-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar150_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar150-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar160_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar200-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar2200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ar2200-s_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015761"
      }
    ]
  },
  "cve": "CVE-2019-19417",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-19417",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.1,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-015761",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-19417",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-015761",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-19417",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2019-015761",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202007-388",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-19417",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-19417"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015761"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-388"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19417"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en. plural Huawei The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-19417"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015761"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-19417"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-19417",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015761",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-388",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-19417",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-19417"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015761"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-388"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19417"
      }
    ]
  },
  "id": "VAR-202007-0473",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.4888332299999999
  },
  "last_update_date": "2024-11-23T23:04:18.274000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20200115-01-sip",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
      },
      {
        "title": "Multiple Huawei Product input verification error vulnerability fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=123635"
      },
      {
        "title": "Huawei Security Advisories: Security Advisory - Three DoS Vulnerabilities in the SIP Module of Some Huawei Products",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=562bd5cf3eb2837f3a77313a6408f674"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-19417"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015761"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-388"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-119",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015761"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19417"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19417"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19417"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/119.html"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/20.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-19417"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015761"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-388"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19417"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2019-19417"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015761"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-388"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-19417"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-07-08T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-19417"
      },
      {
        "date": "2020-08-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-015761"
      },
      {
        "date": "2020-07-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202007-388"
      },
      {
        "date": "2020-07-08T17:15:09.640000",
        "db": "NVD",
        "id": "CVE-2019-19417"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-07-21T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-19417"
      },
      {
        "date": "2020-08-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-015761"
      },
      {
        "date": "2020-07-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202007-388"
      },
      {
        "date": "2024-11-21T04:34:44.617000",
        "db": "NVD",
        "id": "CVE-2019-19417"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-388"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Product input verification vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-015761"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-388"
      }
    ],
    "trust": 0.6
  }
}

var-201802-0550
Vulnerability from variot

Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei AR and SRG series enterprise routers are Huawei's all-in-one routers for small and medium-sized offices or small and medium-sized enterprises. Huawei's SVN series products are Huawei's secure access gateway products; NIP6300/6600 series products and SecospaceUSG series. Huawei is a new generation of professional intrusion prevention and firewall products for customers such as enterprises, IDCs, campus networks and operators. The TE series is a high definition video conferencing terminal that supports 1080p60. A cross-border read vulnerability exists in the H323 protocol of several Huawei products. The vulnerability is caused by the program failing to fully verify the message. The attacker restarts the process by sending a specially constructed packet. Huawei AR120-S and others are all router products of China Huawei (Huawei). There are security vulnerabilities in several Huawei products. A remote attacker could exploit this vulnerability to cause a denial of service (out-of-bounds read and process restart). The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version , V200R007C00, V200R008C20, V200R008C30; AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30-S; AR15

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0550",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r011c03"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "usg9580",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v300r001c20"
      },
      {
        "model": "usg9560",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v300r001c01"
      },
      {
        "model": "usg9520",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v300r001c01"
      },
      {
        "model": "viewpoint 9030",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r011c02"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "usg9520",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v300r001c20"
      },
      {
        "model": "usg9560",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v300r001c20"
      },
      {
        "model": "usg9580",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v300r001c01"
      },
      {
        "model": "secospace usg6300 v500r001c00",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc200"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10spc200"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c11"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "svn5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "tp3106",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r002c00"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00t"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c10"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c10"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "svn5600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c30"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "te50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "svn5600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "svn5800-c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "dp300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "svn5800-c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c01"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c00"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00t"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c15"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "rse6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "smc2.0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "max presence",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "rp200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00spc200"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16pwe"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c00"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c10"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c17"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c20"
      },
      {
        "model": "nip6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "te30",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "rp200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "te60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ar2200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ngfw module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "ar150-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c10"
      },
      {
        "model": "te50",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r002c00"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "srg1300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar1200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ips module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "srg2300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c02"
      },
      {
        "model": "srg3300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "ar120-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "ar160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c01"
      },
      {
        "model": "nip6800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c50"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "ar200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c20"
      },
      {
        "model": "ar150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "secospace usg6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "usg9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "secospace usg6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c00"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar1200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "nip6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v500r001c30"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c20"
      },
      {
        "model": "ar2200-s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "netengine16ex",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r007c00"
      },
      {
        "model": "te40",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r006c00"
      },
      {
        "model": "svn5800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c10"
      },
      {
        "model": "tp3206",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r002c00"
      },
      {
        "model": "ar200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r008c30"
      },
      {
        "model": "ar120-s",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "dp300",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "max presence",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9520 v300r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9560 v300r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9580 v300r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "dp300 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te60 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "tp3106 v100r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "viewpoint v100r011c03",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "9030"
      },
      {
        "model": "viewpoint v100r011c02",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "9030"
      },
      {
        "model": "smc2.0 v100r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9520 v300r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "max presence v100r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "tp3206 v100r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rp200 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rse6500 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te30 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te40 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te50 v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "te50 v600r006c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar120-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar1200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar150-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r006c12",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar160 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c16pwe",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c11",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c12",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c13",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c15",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c16",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r006c17",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar510 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "netengine16ex v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v100r005c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg2300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "srg3300 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar2200-s v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v100r001c10spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ips module v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v100r001c10spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r002c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ngfw module v500r002c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6300 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip6600 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rp200 v500r002c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v200r006c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v200r007c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v200r007c02",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v200r008c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v200r008c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5600 v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5600 v200r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800-c v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800-c v200r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800 v200r003c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn5800 v200r003c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "semg9811 v300r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6300 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v100r001c10",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v100r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v100r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "secospace usg6500 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9500 v500r001c50",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9520 v300r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9560 v300r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "usg9580 v300r001c20",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v500r002c00t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "smc2.0 v600r006c00t",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35591"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012502"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1148"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-15331"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:ar120-s_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:dp300_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ips_module_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:max_presence_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ngfw_module_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012502"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei internal tester",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1148"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2017-15331",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-15331",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-35591",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-106143",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-15331",
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-15331",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-15331",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-35591",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201711-1148",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-106143",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35591"
      },
      {
        "db": "VULHUB",
        "id": "VHN-106143"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012502"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1148"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-15331"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei AR and SRG series enterprise routers are Huawei\u0027s all-in-one routers for small and medium-sized offices or small and medium-sized enterprises. Huawei\u0027s SVN series products are Huawei\u0027s secure access gateway products; NIP6300/6600 series products and SecospaceUSG series. Huawei is a new generation of professional intrusion prevention and firewall products for customers such as enterprises, IDCs, campus networks and operators. The TE series is a high definition video conferencing terminal that supports 1080p60. A cross-border read vulnerability exists in the H323 protocol of several Huawei products. The vulnerability is caused by the program failing to fully verify the message. The attacker restarts the process by sending a specially constructed packet. Huawei AR120-S and others are all router products of China Huawei (Huawei). There are security vulnerabilities in several Huawei products. A remote attacker could exploit this vulnerability to cause a denial of service (out-of-bounds read and process restart). The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version , V200R007C00, V200R008C20, V200R008C30; AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30-S; AR15",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-15331"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012502"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-35591"
      },
      {
        "db": "VULHUB",
        "id": "VHN-106143"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-15331",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012502",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1148",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-35591",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-106143",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35591"
      },
      {
        "db": "VULHUB",
        "id": "VHN-106143"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012502"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1148"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-15331"
      }
    ]
  },
  "id": "VAR-201802-0550",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35591"
      },
      {
        "db": "VULHUB",
        "id": "VHN-106143"
      }
    ],
    "trust": 1.6444506977181206
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35591"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:12:40.382000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20171129-01-h323",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
      },
      {
        "title": "Patches for a variety of Huawei products H323 protocol out of bounds read vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/107343"
      },
      {
        "title": "Multiple Huawei Product Buffer Error Vulnerability Fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76803"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35591"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012502"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1148"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-125",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-106143"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012502"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-15331"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-15331"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15331"
      },
      {
        "trust": 0.6,
        "url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171129-01-h323-cn"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35591"
      },
      {
        "db": "VULHUB",
        "id": "VHN-106143"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012502"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1148"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-15331"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-35591"
      },
      {
        "db": "VULHUB",
        "id": "VHN-106143"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012502"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1148"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-15331"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-35591"
      },
      {
        "date": "2018-02-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-106143"
      },
      {
        "date": "2018-03-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-012502"
      },
      {
        "date": "2017-11-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-1148"
      },
      {
        "date": "2018-02-15T16:29:00.330000",
        "db": "NVD",
        "id": "CVE-2017-15331"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-35591"
      },
      {
        "date": "2018-03-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-106143"
      },
      {
        "date": "2018-03-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-012502"
      },
      {
        "date": "2017-11-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-1148"
      },
      {
        "date": "2024-11-21T03:14:28.733000",
        "db": "NVD",
        "id": "CVE-2017-15331"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1148"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Product out-of-bounds vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012502"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-1148"
      }
    ],
    "trust": 0.6
  }
}