cve-2017-17174
Vulnerability from cvelistv5
Published
2018-07-31 14:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
Some Huawei products RSE6500 V500R002C00; SoftCo V200R003C20SPCb00; VP9660 V600R006C10; eSpace U1981 V100R001C20; V200R003C20; V200R003C30; V200R003C50 have a weak algorithm vulnerability. To exploit the vulnerability, a remote, unauthenticated attacker has to capture TLS traffic between clients and the affected products. The attacker may launch the Bleichenbacher attack on RSA key exchange to decrypt the session key and the previously captured sessions by some cryptanalytic operations. Successful exploit may cause information leak.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | RSE6500; SoftCo; VP9660; eSpace U1981 |
Version: RSE6500 V500R002C00 Version: SoftCo V200R003C20SPCb00 Version: VP9660 V600R006C10 Version: eSpace U1981 V100R001C20 Version: V200R003C20 Version: V200R003C30 Version: V200R003C50 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:43:59.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180703-01-algorithm-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "RSE6500; SoftCo; VP9660; eSpace U1981", "vendor": "Huawei Technologies Co., Ltd.", "versions": [ { "status": "affected", "version": "RSE6500 V500R002C00" }, { "status": "affected", "version": "SoftCo V200R003C20SPCb00" }, { "status": "affected", "version": "VP9660 V600R006C10" }, { "status": "affected", "version": "eSpace U1981 V100R001C20" }, { "status": "affected", "version": "V200R003C20" }, { "status": "affected", "version": "V200R003C30" }, { "status": "affected", "version": "V200R003C50" } ] } ], "datePublic": "2018-07-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Some Huawei products RSE6500 V500R002C00; SoftCo V200R003C20SPCb00; VP9660 V600R006C10; eSpace U1981 V100R001C20; V200R003C20; V200R003C30; V200R003C50 have a weak algorithm vulnerability. To exploit the vulnerability, a remote, unauthenticated attacker has to capture TLS traffic between clients and the affected products. The attacker may launch the Bleichenbacher attack on RSA key exchange to decrypt the session key and the previously captured sessions by some cryptanalytic operations. Successful exploit may cause information leak." } ], "problemTypes": [ { "descriptions": [ { "description": "weak algorithm", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-31T13:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180703-01-algorithm-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2017-17174", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "RSE6500; SoftCo; VP9660; eSpace U1981", "version": { "version_data": [ { "version_value": "RSE6500 V500R002C00" }, { "version_value": "SoftCo V200R003C20SPCb00" }, { "version_value": "VP9660 V600R006C10" }, { "version_value": "eSpace U1981 V100R001C20" }, { "version_value": "V200R003C20" }, { "version_value": "V200R003C30" }, { "version_value": "V200R003C50" } ] } } ] }, "vendor_name": "Huawei Technologies Co., Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Huawei products RSE6500 V500R002C00; SoftCo V200R003C20SPCb00; VP9660 V600R006C10; eSpace U1981 V100R001C20; V200R003C20; V200R003C30; V200R003C50 have a weak algorithm vulnerability. To exploit the vulnerability, a remote, unauthenticated attacker has to capture TLS traffic between clients and the affected products. The attacker may launch the Bleichenbacher attack on RSA key exchange to decrypt the session key and the previously captured sessions by some cryptanalytic operations. Successful exploit may cause information leak." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "weak algorithm" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180703-01-algorithm-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180703-01-algorithm-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2017-17174", "datePublished": "2018-07-31T14:00:00", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-08-05T20:43:59.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-17174\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2018-07-31T14:29:00.247\",\"lastModified\":\"2024-11-21T03:17:38.853\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Some Huawei products RSE6500 V500R002C00; SoftCo V200R003C20SPCb00; VP9660 V600R006C10; eSpace U1981 V100R001C20; V200R003C20; V200R003C30; V200R003C50 have a weak algorithm vulnerability. To exploit the vulnerability, a remote, unauthenticated attacker has to capture TLS traffic between clients and the affected products. The attacker may launch the Bleichenbacher attack on RSA key exchange to decrypt the session key and the previously captured sessions by some cryptanalytic operations. Successful exploit may cause information leak.\"},{\"lang\":\"es\",\"value\":\"Algunos productos Huawei RSE6500 V500R002C00; SoftCo V200R003C20SPCb00; VP9660 V600R006C10; eSpace U1981 V100R001C20; V200R003C20; V200R003C30 y V200R003C50 tienen una vulnerabilidad de algoritmo d\u00e9bil. Para explotar esta vulnerabilidad, un atacante no autenticado remoto debe capturar tr\u00e1fico TLS entre los clientes y los productos afectados. El atacante podr\u00eda iniciar un ataque Bleichenbacher en el intercambio de claves RSA para descifrar la clave de sesi\u00f3n y las sesiones previamente capturadas por medio de operaciones de criptoan\u00e1lisis. Un exploit con \u00e9xito podr\u00eda provocar un filtrado de informaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"649BB696-BDBE-46FC-A23D-287DE306D8BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD9417D-0515-4B21-AD32-E6B137575D01\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:softco_firmware:v200r003c20spcb00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CCA190A-D381-4139-B2A6-28B19A534C75\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB0BB461-988A-4E55-BEFC-C5BB8245E751\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:vp9660_firmware:v600r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D888F94-B0D9-4CFF-8A29-7F1720B5BEDA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1DC498B-F19F-403A-ACFE-F8364A78EC66\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:espace_u1981_firmware:v200r001c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDC5311E-194E-4891-B762-8FC1EAA27E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C82BCBDF-4F07-47F1-BB91-6148E2403133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC865317-D874-469D-AE84-7700B0F1485C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21E676EE-B0B5-4177-8676-2936DE259C39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7BD4D80-D901-4082-B74D-A1D0CC24CA9F\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180703-01-algorithm-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180703-01-algorithm-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.