cve-2019-5291
Vulnerability from cvelistv5
Published
2019-12-13 14:35
Modified
2024-08-04 19:54
Severity ?
EPSS score ?
Summary
Some Huawei products have an insufficient verification of data authenticity vulnerability. A remote, unauthenticated attacker has to intercept specific packets between two devices, modify the packets, and send the modified packets to the peer device. Due to insufficient verification of some fields in the packets, an attacker may exploit the vulnerability to cause the target device to be abnormal.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;CloudEngine 12800;NetEngine16EX;S6700;SRG1300;SRG2300;SRG3300 |
Version: V200R005C20 Version: V200R006C10 Version: V200R007C00 Version: V200R008C50 Version: V200R005C00 Version: V200R002C10 Version: V200R002C20 Version: V200R008C00 Version: V200R010C00SPC300 Version: V200R010C00SPC600 Version: V200R011C00SPC200 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:54:52.966Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-validation-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;CloudEngine 12800;NetEngine16EX;S6700;SRG1300;SRG2300;SRG3300", "vendor": "n/a", "versions": [ { "status": "affected", "version": "V200R005C20" }, { "status": "affected", "version": "V200R006C10" }, { "status": "affected", "version": "V200R007C00" }, { "status": "affected", "version": "V200R008C50" }, { "status": "affected", "version": "V200R005C00" }, { "status": "affected", "version": "V200R002C10" }, { "status": "affected", "version": "V200R002C20" }, { "status": "affected", "version": "V200R008C00" }, { "status": "affected", "version": "V200R010C00SPC300" }, { "status": "affected", "version": "V200R010C00SPC600" }, { "status": "affected", "version": "V200R011C00SPC200" } ] } ], "descriptions": [ { "lang": "en", "value": "Some Huawei products have an insufficient verification of data authenticity vulnerability. A remote, unauthenticated attacker has to intercept specific packets between two devices, modify the packets, and send the modified packets to the peer device. Due to insufficient verification of some fields in the packets, an attacker may exploit the vulnerability to cause the target device to be abnormal." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient Verification", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-13T14:35:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-validation-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2019-5291", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;CloudEngine 12800;NetEngine16EX;S6700;SRG1300;SRG2300;SRG3300", "version": { "version_data": [ { "version_value": "V200R005C20" }, { "version_value": "V200R006C10" }, { "version_value": "V200R007C00" }, { "version_value": "V200R008C50" }, { "version_value": "V200R005C00" }, { "version_value": "V200R002C10" }, { "version_value": "V200R002C20" }, { "version_value": "V200R008C00" }, { "version_value": "V200R010C00SPC300" }, { "version_value": "V200R010C00SPC600" }, { "version_value": "V200R011C00SPC200" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Huawei products have an insufficient verification of data authenticity vulnerability. A remote, unauthenticated attacker has to intercept specific packets between two devices, modify the packets, and send the modified packets to the peer device. Due to insufficient verification of some fields in the packets, an attacker may exploit the vulnerability to cause the target device to be abnormal." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient Verification" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-validation-en", "refsource": "MISC", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-validation-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2019-5291", "datePublished": "2019-12-13T14:35:50", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:54:52.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-5291\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2019-12-13T15:15:11.457\",\"lastModified\":\"2024-11-21T04:44:41.010\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Some Huawei products have an insufficient verification of data authenticity vulnerability. A remote, unauthenticated attacker has to intercept specific packets between two devices, modify the packets, and send the modified packets to the peer device. Due to insufficient verification of some fields in the packets, an attacker may exploit the vulnerability to cause the target device to be abnormal.\"},{\"lang\":\"es\",\"value\":\"Algunos productos Huawei presentan una comprobaci\u00f3n insuficiente de una vulnerabilidad de autenticidad de datos. Un atacante remoto no autenticado tiene que interceptar paquetes espec\u00edficos entre dos dispositivos, modificar los paquetes y enviar los paquetes modificados hacia el dispositivo peer. Debido a la comprobaci\u00f3n insuficiente de algunos campos en los paquetes, un atacante puede explotar la vulnerabilidad para causar que el dispositivo objetivo sea anormal.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-345\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C6C92D-7F31-49FB-BE40-035811FD69AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DD9E894-321E-4A61-9DA6-677042DDD739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14AE26C9-C434-4EFB-A1E6-64563BFAA389\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0CFDB51-BF44-4433-AB2A-CFF553F8D640\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7BF5F97-5504-4EA8-8052-36EB58EC8E20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFE416CD-53B5-4E08-BB30-682887740C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F64071E5-6ACD-4E51-9162-B0FF3DC08E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75E27982-56E6-4A6F-9124-34C7420FDDE1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BA4150-8CA8-48BF-9D45-ABC8AC710060\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BC1D978-9DA1-4165-A66C-2D274B188C88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB60F62-0715-4C1E-B352-A3D61B56E2AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D125153E-FE39-49A7-95AA-9482C78E7114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF226F5B-7BF8-4475-8C0C-91E2E43C6E53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B053C248-3CC2-476D-95A7-90EDD8EAAD69\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDFC3878-5A1D-4846-B4F9-3D1FC1DBCF5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0D92A6F-B30C-4E09-91FC-9C7FFF375710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455D7A4E-523E-40C8-958D-59D128F3E797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25AB058D-C4EB-416F-ACD3-B6ACC2BD83AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"526371A8-11FE-4D00-AFBB-8E867A320B27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4403DAD1-90B3-44EC-8A34-64D6E321170B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BC8C3E-420F-49D1-9E58-98E4E23A024F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"787AC5E3-CE88-491D-8211-BAB11112019D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C194C888-308D-4301-A277-598AD954010E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"372E2136-95CE-4833-B4AF-306F0807BA79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A72083-717F-4C71-A2D7-62E1C64FEE94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D609298-9ACE-4726-AD04-6765D8F2C374\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"137A007D-A498-483F-8B4F-DCA118B25F11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"629DF7DD-4900-41CB-B257-7DE20A9B9DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C77ADC-2511-4630-B5F5-F2991EA39E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"622686BB-9302-449F-9351-75B189D1B184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1ED9DF8-A444-4684-932D-12B4B2F98736\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17586781-04AB-4285-BCA2-5DB13B8D94E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7114E20-407A-4B1C-9FCE-FF367B50E0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE9B95EB-A848-4311-8500-9C909784393E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C736642A-6B32-458B-AF12-FD45534BEA60\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DE9947-C096-4B7F-8F3E-748DEFC677C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F042B27-F875-4BA3-9002-E5ADC544208B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F377CE1E-77A7-447F-B692-A54682A26BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64CC27CC-EE60-46DE-91CE-6C83AF1F7B3A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50662078-4827-4706-AE29-170E2239C5AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A20ED1-7138-4FD0-BA2B-637D41739603\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32119825-AF22-44AA-8D04-1FAACF9E2E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2BC38B-D016-4E83-A14E-FE8575135DD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3409C0D7-74AF-46AD-9E93-9D1F187C291F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5862E1A5-0222-4059-B9D7-716A6D0EB8CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C10C07E-5194-4EAB-9AC8-DB87CE52F5FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB9A3444-A485-4B87-B910-F3DA5C8E5D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9752658E-3CF5-4D9E-98FB-D15FD892479C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FD70804-3A07-4C82-806B-5F5CA075ABF1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9309E1AA-0C4E-422C-9307-A8DD0AE5D576\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26CFB676-658E-4DEF-8C29-13CA633D7270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D395DD8-E338-457E-A4E6-D3A08DE1B571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3600_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52BBC28A-2A50-402F-B3CA-03718789F503\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCC0FC04-05F0-4591-89EF-4E54D9A3ED8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7353CA0-9073-4EBD-B2FF-6FAD43274E3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8A2875-0F7E-4790-A925-5999396B7578\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A321DABC-2B17-4B32-AF63-944476C0E68D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE7A0E2C-8383-443D-8625-77CBC53D2140\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F75C6A63-E42C-4D42-9E66-F561D9B67D8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6224ECC-6949-4204-94D1-C7374C142A50\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA5CF67-A58B-4666-B87E-712507233453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r010c00spc300:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17889C1C-0187-4814-940D-5BA6DDA39ECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r010c00spc600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAA552D9-B8ED-4DD9-B825-FDB42F7070E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r011c00spc200:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E07DB63-8FF2-4CBA-A418-59F24D6F005B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA7AC10D-B0DD-4206-8642-134DDD585C06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98DCADD0-8E0D-4241-AB94-32233C46790E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DF1DFD2-5337-45CA-A1A9-2E6622536027\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B319F31F-94D7-468F-8F71-96F40867AEA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D578E607-CF83-4121-8AF9-EF1DBE5FE42F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C897138-887E-4CD9-B4D2-A8D5DAA851DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D485D5E3-3819-4F3A-B841-ACB6253ACF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D10EBBF2-8F03-472C-96DB-C72E426E4E38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D672376C-4256-4CFB-A515-56E31A6706AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BAF601C-B8EC-42F5-95F4-274F8492F57E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"202E709E-CC7D-44AF-A63F-30A6A738F5EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"309B9B0E-3639-4913-9DE4-9D4DAE6B0065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4619CF2C-AB5D-475A-ACF6-61EE02306F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43BAC724-4E88-4E3B-9F95-8086D68CADA9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43681AE7-5C12-4772-85A9-0A10177C6CFD\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-validation-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-validation-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.