cve-2020-9101
Vulnerability from cvelistv5
Published
2020-07-17 23:05
Modified
2024-08-04 10:19
Severity ?
EPSS score ?
Summary
There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | IPS Module |
Version: V500R005C00 Version: V500R005C10 |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:19.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IPS Module", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "V500R005C00" }, { "status": "affected", "version": "V500R005C10" } ] }, { "product": "NGFW Module", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "V500R005C00" }, { "status": "affected", "version": "V500R005C10" } ] }, { "product": "Secospace USG6300", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "V500R001C30" }, { "status": "affected", "version": "V500R001C60" }, { "status": "affected", "version": "V500R005C00" }, { "status": "affected", "version": "V500R005C10" } ] }, { "product": "Secospace USG6500", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "V500R001C30" }, { "status": "affected", "version": "V500R001C60" }, { "status": "affected", "version": "V500R005C00" }, { "status": "affected", "version": "V500R005C10" } ] }, { "product": "Secospace USG6600", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "V500R001C30" }, { "status": "affected", "version": "V500R001C60" }, { "status": "affected", "version": "V500R005C00" }, { "status": "affected", "version": "V500R005C10" } ] }, { "product": "USG9500", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "V500R001C30" }, { "status": "affected", "version": "V500R001C60" }, { "status": "affected", "version": "V500R005C00" }, { "status": "affected", "version": "V500R005C10" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10" } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-17T23:05:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9101", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IPS Module", "version": { "version_data": [ { "version_value": "V500R005C00" }, { "version_value": "V500R005C10" } ] } }, { "product_name": "NGFW Module", "version": { "version_data": [ { "version_value": "V500R005C00" }, { "version_value": "V500R005C10" } ] } }, { "product_name": "Secospace USG6300", "version": { "version_data": [ { "version_value": "V500R001C30" }, { "version_value": "V500R001C60" }, { "version_value": "V500R005C00" }, { "version_value": "V500R005C10" } ] } }, { "product_name": "Secospace USG6500", "version": { "version_data": [ { "version_value": "V500R001C30" }, { "version_value": "V500R001C60" }, { "version_value": "V500R005C00" }, { "version_value": "V500R005C10" } ] } }, { "product_name": "Secospace USG6600", "version": { "version_data": [ { "version_value": "V500R001C30" }, { "version_value": "V500R001C60" }, { "version_value": "V500R005C00" }, { "version_value": "V500R005C10" } ] } }, { "product_name": "USG9500", "version": { "version_data": [ { "version_value": "V500R001C30" }, { "version_value": "V500R001C60" }, { "version_value": "V500R005C00" }, { "version_value": "V500R005C10" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en", "refsource": "CONFIRM", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9101", "datePublished": "2020-07-17T23:05:27", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:19.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-9101\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2020-07-18T01:16:35.037\",\"lastModified\":\"2024-11-21T05:40:01.727\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de escritura fuera de l\u00edmites en algunos productos. Un atacante no autenticado dise\u00f1a paquetes malformados con par\u00e1metros espec\u00edficos y env\u00eda los paquetes a los productos afectados. Debido a una comprobaci\u00f3n insuficiente de los paquetes, que pueden ser explotada para causar el reinicio del proceso. Las versiones del producto afectado incluyen: IPS Module versiones V500R005C00, V500R005C10; NGFW Module versiones V500R005C00, V500R005C10; Secospace USG6300 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":3.3,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.5,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ips_module_firmware:v500r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60A9007D-D6AD-4DB9-A0AC-1E400AEC0884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ips_module_firmware:v500r005c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"675FA47C-BF23-4B1B-B8F5-CE7C7585ACB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BAD43A3-730A-4ABC-89F0-DF93A06AA60F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D57DC59-B234-463F-8BBD-631B7EE9928C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22251FD6-AF00-4A49-BAA1-282601530155\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8AEAB1-6106-47A2-8207-67E557A8BF80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDD7E147-B39E-4C6F-BA5F-F046F3AE4728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68E9D32D-46F1-495B-BF83-308DFF8822F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A59F0A0-4138-4BA3-887D-5A4AE7B2F816\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C281B511-7A27-4FC6-9427-AE5AD7C302F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"627F40B6-8CD1-47EE-8937-F1FAAAB86F0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE084FC-27EB-4CE6-B529-508DA690C9D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6C14DF5-42F7-470F-B3DD-52B5A0770EC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45889CE6-9A6C-48FE-B1F4-52CB85BB4809\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6AACFD2-9C9D-49E3-A911-0CF58F863EE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DCE606C-33E8-44C1-AD66-EDFEC391CBA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE469876-F873-4705-9760-097AE840A818\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F14B3F-EA8C-4A01-9968-08ECACDA6CBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E961C6AA-400A-41CF-A230-FE7182875F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:usg9500_firmware:v500r005c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A32EF67-5C9D-4F2F-BCC9-D5C5C9F69544\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B6064BB-5E62-4D70-B933-05B5426EEE9C\"}]}]}],\"references\":[{\"url\":\"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.