fkie_cve-2014-2946
Vulnerability from fkie_nvd
Published
2014-06-02 19:55
Modified
2024-11-21 02:07
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in api/sms/send-sms in the Web UI 11.010.06.01.858 on Huawei E303 modems with software 22.157.18.00.858 allows remote attackers to hijack the authentication of administrators for requests that perform API operations and send SMS messages via a request element in an XML document.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | webui | 11.010.06.01.858 | |
huawei | e303_modem_firmware | 22.157.18.00.858 | |
huawei | e303_modem | ch2e303sm |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:huawei:webui:11.010.06.01.858:*:*:*:*:*:*:*", matchCriteriaId: "A5F8F1A7-5A91-4CE1-B8B1-AEFA6050458C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:e303_modem_firmware:22.157.18.00.858:*:*:*:*:*:*:*", matchCriteriaId: "6E1A97A8-D646-4200-B6DF-775F3349FE74", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:e303_modem:ch2e303sm:*:*:*:*:*:*:*", matchCriteriaId: "7E65BCF5-5861-451E-8C0E-3607AD434336", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cross-site request forgery (CSRF) vulnerability in api/sms/send-sms in the Web UI 11.010.06.01.858 on Huawei E303 modems with software 22.157.18.00.858 allows remote attackers to hijack the authentication of administrators for requests that perform API operations and send SMS messages via a request element in an XML document.", }, { lang: "es", value: "Vulnerabilidad de CSRF en api/sms/send-sms el la interfaz de usuario web 11.010.06.01.858 en módems Huawei E303 con software 22.157.18.00.858 permite a atacantes remotos secuestrar la autenticación de administradores para solicitudes que realizan operaciones API y envían mensajes SMS a través de un elemento de solicitud en un documento XML.", }, ], id: "CVE-2014-2946", lastModified: "2024-11-21T02:07:13.587", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2014-06-02T19:55:03.440", references: [ { source: "cret@cert.org", url: "http://b.fl7.de/2014/05/huawei-e303-sms-vulnerability-CVE-2014-2946.html", }, { source: "cret@cert.org", url: "http://secunia.com/advisories/58992", }, { source: "cret@cert.org", tags: [ "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/325636", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://b.fl7.de/2014/05/huawei-e303-sms-vulnerability-CVE-2014-2946.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/58992", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/325636", }, ], sourceIdentifier: "cret@cert.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-352", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.