cve-2020-9101
Vulnerability from cvelistv5
Published
2020-07-17 23:05
Modified
2024-08-04 10:19
Severity ?
Summary
There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10
Impacted products
Vendor Product Version
Huawei IPS Module Version: V500R005C00
Version: V500R005C10
Create a notification for this product.
   Huawei NGFW Module Version: V500R005C00
Version: V500R005C10
Create a notification for this product.
   Huawei Secospace USG6300 Version: V500R001C30
Version: V500R001C60
Version: V500R005C00
Version: V500R005C10
Create a notification for this product.
   Huawei Secospace USG6500 Version: V500R001C30
Version: V500R001C60
Version: V500R005C00
Version: V500R005C10
Create a notification for this product.
   Huawei Secospace USG6600 Version: V500R001C30
Version: V500R001C60
Version: V500R005C00
Version: V500R005C10
Create a notification for this product.
   Huawei USG9500 Version: V500R001C30
Version: V500R001C60
Version: V500R005C00
Version: V500R005C10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:19:19.829Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "IPS Module",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R005C00"
            },
            {
              "status": "affected",
              "version": "V500R005C10"
            }
          ]
        },
        {
          "product": "NGFW Module",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R005C00"
            },
            {
              "status": "affected",
              "version": "V500R005C10"
            }
          ]
        },
        {
          "product": "Secospace USG6300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C60"
            },
            {
              "status": "affected",
              "version": "V500R005C00"
            },
            {
              "status": "affected",
              "version": "V500R005C10"
            }
          ]
        },
        {
          "product": "Secospace USG6500",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C60"
            },
            {
              "status": "affected",
              "version": "V500R005C00"
            },
            {
              "status": "affected",
              "version": "V500R005C10"
            }
          ]
        },
        {
          "product": "Secospace USG6600",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C60"
            },
            {
              "status": "affected",
              "version": "V500R005C00"
            },
            {
              "status": "affected",
              "version": "V500R005C10"
            }
          ]
        },
        {
          "product": "USG9500",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "V500R001C30"
            },
            {
              "status": "affected",
              "version": "V500R001C60"
            },
            {
              "status": "affected",
              "version": "V500R005C00"
            },
            {
              "status": "affected",
              "version": "V500R005C10"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Out-of-bounds Write",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-17T23:05:27",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2020-9101",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "IPS Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R005C00"
                          },
                          {
                            "version_value": "V500R005C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NGFW Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R005C00"
                          },
                          {
                            "version_value": "V500R005C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Secospace USG6300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C60"
                          },
                          {
                            "version_value": "V500R005C00"
                          },
                          {
                            "version_value": "V500R005C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Secospace USG6500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C60"
                          },
                          {
                            "version_value": "V500R005C00"
                          },
                          {
                            "version_value": "V500R005C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Secospace USG6600",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C60"
                          },
                          {
                            "version_value": "V500R005C00"
                          },
                          {
                            "version_value": "V500R005C10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "USG9500",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V500R001C30"
                          },
                          {
                            "version_value": "V500R001C60"
                          },
                          {
                            "version_value": "V500R005C00"
                          },
                          {
                            "version_value": "V500R005C10"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Out-of-bounds Write"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2020-9101",
    "datePublished": "2020-07-17T23:05:27",
    "dateReserved": "2020-02-18T00:00:00",
    "dateUpdated": "2024-08-04T10:19:19.829Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2020-9101\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2020-07-18T01:16:35.037\",\"lastModified\":\"2024-11-21T05:40:01.727\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de escritura fuera de l\u00edmites en algunos productos. Un atacante no autenticado dise\u00f1a paquetes malformados con par\u00e1metros espec\u00edficos y env\u00eda los paquetes a los productos afectados. Debido a una comprobaci\u00f3n insuficiente de los paquetes, que pueden ser explotada para causar el reinicio del proceso. Las versiones del producto afectado incluyen:  IPS Module versiones V500R005C00, V500R005C10; NGFW Module versiones V500R005C00, V500R005C10; Secospace USG6300 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":3.3,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.5,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ips_module_firmware:v500r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60A9007D-D6AD-4DB9-A0AC-1E400AEC0884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ips_module_firmware:v500r005c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"675FA47C-BF23-4B1B-B8F5-CE7C7585ACB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BAD43A3-730A-4ABC-89F0-DF93A06AA60F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D57DC59-B234-463F-8BBD-631B7EE9928C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22251FD6-AF00-4A49-BAA1-282601530155\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8AEAB1-6106-47A2-8207-67E557A8BF80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDD7E147-B39E-4C6F-BA5F-F046F3AE4728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68E9D32D-46F1-495B-BF83-308DFF8822F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A59F0A0-4138-4BA3-887D-5A4AE7B2F816\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C281B511-7A27-4FC6-9427-AE5AD7C302F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"627F40B6-8CD1-47EE-8937-F1FAAAB86F0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE084FC-27EB-4CE6-B529-508DA690C9D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6C14DF5-42F7-470F-B3DD-52B5A0770EC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45889CE6-9A6C-48FE-B1F4-52CB85BB4809\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6AACFD2-9C9D-49E3-A911-0CF58F863EE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DCE606C-33E8-44C1-AD66-EDFEC391CBA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE469876-F873-4705-9760-097AE840A818\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F14B3F-EA8C-4A01-9968-08ECACDA6CBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E961C6AA-400A-41CF-A230-FE7182875F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:usg9500_firmware:v500r005c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A32EF67-5C9D-4F2F-BCC9-D5C5C9F69544\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B6064BB-5E62-4D70-B933-05B5426EEE9C\"}]}]}],\"references\":[{\"url\":\"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.