fkie_cve-2020-1827
Vulnerability from fkie_nvd
Published
2020-02-17 21:15
Modified
2024-11-21 05:11
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00spc100
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00spc100
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00spc100
huawei usg9500 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3D681F-E141-4BB1-9437-8BFE286CB164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "954A1F94-2442-4064-9DC5-14EFC2FA62F7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "875441DD-575F-4F4D-A6BD-23C38641D330",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "5226BD96-2B00-469B-AADD-CD0541610BBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE469876-F873-4705-9760-097AE840A818",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7369E3-5F3F-40D1-8690-95192131B683",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage."
    },
    {
      "lang": "es",
      "value": "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00SPC100; y Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00SPC100, presentan una vulnerabilidad de fuga de informaci\u00f3n. Un atacante puede explotar esta vulnerabilidad mediante el env\u00edo de paquetes de petici\u00f3n espec\u00edficos hacia los dispositivos afectados. Una explotaci\u00f3n con \u00e9xito puede conllevar a una fuga de informaci\u00f3n."
    }
  ],
  "id": "CVE-2020-1827",
  "lastModified": "2024-11-21T05:11:26.723",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-02-17T21:15:12.757",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-404"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.