Search criteria
3 vulnerabilities found for s2350ei by huawei
VAR-201706-0237
Vulnerability from variot - Updated: 2025-04-20 23:36The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message. HuaweiS2300 is a switch device of Huawei (Huawei). IPstack is one of the transport protocols. IPstack in several Huawei products has a security vulnerability. The vulnerability stems from the failure of the packet processing module to correctly determine the length of the IP option. An attacker can use this vulnerability to create a board reset by using a special ICMP packet. The following versions are affected: Huawei S2300/S2700/S3300/S3700 V100R00600 Version, V100R006C03 Version, V100R006C05 Version; S5300EI/S5700EI/S5300SI/S5700SI V100R006C00 Version, V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300HI/S5700HI S6300EI/S6700EI /S5710HI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300LI/S5700LI/S2350EI/S2750EI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version, V200R006C00SPC500 Version, V200R007C00SPC500 Version; S5720HI V200R006C00SPC500 Version, V200R007C00SPC500 Version; S7700/S9300/ S9700 V200R001C00SPC300, V200R002C00SPC300, V200R003C00SPC500, V200R005C00SPC300, V200R006C00SPC500, V200R007C00SPC500; S12700
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201706-0237",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s6300ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5720hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s6700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s6700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5720hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2750ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700si",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5710hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi v200r006c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi v200r007c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2350ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2750ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300si_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700si_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5710hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5720hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
}
]
},
"cve": "CVE-2015-3913",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2015-3913",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-33208",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-81874",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2015-3913",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-3913",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-3913",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2017-33208",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201706-290",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-81874",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message. HuaweiS2300 is a switch device of Huawei (Huawei). IPstack is one of the transport protocols. IPstack in several Huawei products has a security vulnerability. The vulnerability stems from the failure of the packet processing module to correctly determine the length of the IP option. An attacker can use this vulnerability to create a board reset by using a special ICMP packet. The following versions are affected: Huawei S2300/S2700/S3300/S3700 V100R00600 Version, V100R006C03 Version, V100R006C05 Version; S5300EI/S5700EI/S5300SI/S5700SI V100R006C00 Version, V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300HI/S5700HI S6300EI/S6700EI /S5710HI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300LI/S5700LI/S2350EI/S2750EI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version, V200R006C00SPC500 Version, V200R007C00SPC500 Version; S5720HI V200R006C00SPC500 Version, V200R007C00SPC500 Version; S7700/S9300/ S9700 V200R001C00SPC300, V200R002C00SPC300, V200R003C00SPC500, V200R005C00SPC300, V200R006C00SPC500, V200R007C00SPC500; S12700",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-3913"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-3913",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-33208",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-81874",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"id": "VAR-201706-0237",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
}
],
"trust": 1.48522971
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
}
]
},
"last_update_date": "2025-04-20T23:36:54.009000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20150506-01-ICMP",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-427449"
},
{
"title": "Patches for various Huawei product input verification vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/105678"
},
{
"title": "Multiple Huawei Fixes for product input validation vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74793"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3913"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-3913"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-427449"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"date": "2017-06-08T00:00:00",
"db": "VULHUB",
"id": "VHN-81874"
},
{
"date": "2017-07-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"date": "2017-06-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"date": "2017-06-08T21:29:00.377000",
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"date": "2017-06-22T00:00:00",
"db": "VULHUB",
"id": "VHN-81874"
},
{
"date": "2017-07-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"date": "2017-09-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Campus Series switch model IP Service operation disruption in the stack (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
}
],
"trust": 0.6
}
}
VAR-201604-0327
Vulnerability from variot - Updated: 2025-04-13 23:36Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets. HuaweiS5300EI is a Huawei S series switch product. The HuaweiS5300EI handles memory leaks in ICMPv6 packets, allowing remote attackers to exploit vulnerabilities to submit special requests for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. The Huawei S5300EI and others are all S-series switch products of China's Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: Huawei S5300EI, S5300SI, S5310HI, S6300EI, S2350EI, S5300LI, S9300, S7700, and S9700 using software V200R001C00, V200R002C00, and V200R003C00;
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201604-0327",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9300",
"scope": "lt",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "lt",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "lt",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph023"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5310hi",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s2350ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5310hi",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2350ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s3300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s9700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s3300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s5300li",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300li",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s9300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph023"
},
{
"model": "s9300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s7700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s6300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300si",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s7700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s7700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph023"
},
{
"model": "s5300si",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2350ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300li",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph023"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s6300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s3300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph023"
},
{
"model": "s3300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5310hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph023"
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s7700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s5310hi",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s7700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300si",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s5300ei v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720ei 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:s2300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2350ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2350ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300li",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300li_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300si",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300si_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5310hi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5310hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s6300ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s7700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported the issue.",
"sources": [
{
"db": "BID",
"id": "90893"
}
],
"trust": 0.3
},
"cve": "CVE-2015-8676",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2015-8676",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "CNVD-2016-02290",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-86637",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2015-8676",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-8676",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-8676",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2016-02290",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201604-313",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-86637",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "VULHUB",
"id": "VHN-86637"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets. HuaweiS5300EI is a Huawei S series switch product. The HuaweiS5300EI handles memory leaks in ICMPv6 packets, allowing remote attackers to exploit vulnerabilities to submit special requests for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. The Huawei S5300EI and others are all S-series switch products of China\u0027s Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: Huawei S5300EI, S5300SI, S5310HI, S6300EI, S2350EI, S5300LI, S9300, S7700, and S9700 using software V200R001C00, V200R002C00, and V200R003C00;",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8676"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "BID",
"id": "90893"
},
{
"db": "VULHUB",
"id": "VHN-86637"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8676",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-02290",
"trust": 0.6
},
{
"db": "BID",
"id": "90893",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-86637",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "VULHUB",
"id": "VHN-86637"
},
{
"db": "BID",
"id": "90893"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"id": "VAR-201604-0327",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "VULHUB",
"id": "VHN-86637"
}
],
"trust": 1.61575809
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
}
]
},
"last_update_date": "2025-04-13T23:36:24.954000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20160113-02-Switch",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en"
},
{
"title": "Patches for various Huawei product switches ICMPv6 packet memory leak vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/74357"
},
{
"title": "Multiple Huawei Product memory leak vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60968"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
},
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86637"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8676"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8676"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "VULHUB",
"id": "VHN-86637"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "VULHUB",
"id": "VHN-86637"
},
{
"db": "BID",
"id": "90893"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"date": "2016-04-14T00:00:00",
"db": "VULHUB",
"id": "VHN-86637"
},
{
"date": "2016-01-13T00:00:00",
"db": "BID",
"id": "90893"
},
{
"date": "2016-04-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"date": "2016-04-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"date": "2016-04-14T15:59:02.980000",
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"date": "2019-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-86637"
},
{
"date": "2016-07-06T14:51:00",
"db": "BID",
"id": "90893"
},
{
"date": "2016-04-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"date": "2016-04-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Service disruption in products (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
}
],
"trust": 0.6
}
}
VAR-201604-0328
Vulnerability from variot - Updated: 2025-04-13 23:18Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information. HuaweiS5300EI is a Huawei S series switch product. A number of Huawei products have a memory leak vulnerability in the HTTPS or SFTP server, allowing remote attackers to consume memory and log in and out of the HTTPS or SFTP server for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause a memory exhaustion, denying service to legitimate users. The Huawei S5300EI and others are all S-series switch products of China's Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: using V200R003C00 version and V200R005C00 version software Huawei S5300EI , S5300SI , S5310HI , S6300EI ,use V200R003C00 Version, V200R005C00 version and V200R006C00 version software Huawei S2350EI , S5300LI , S9300 , S7700 , S9700 ,use V200R006C00 version software Huawei S5720HI, S5720EI, Huawei S2300, S3300 using V100R006C05 software
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201604-0328",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s2350ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5310hi",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005sph009"
},
{
"model": "s7700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s7700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph003"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s5310hi",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s9700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph003"
},
{
"model": "s9700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s3300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s2300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s3300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s7700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005sph009"
},
{
"model": "s2350ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005sph009"
},
{
"model": "s5300li",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300li",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s9300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s7700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5720hi",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5720hi",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s6300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300si",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300li",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5720ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5300si",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s7700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2350ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph003"
},
{
"model": "s9300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5720ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s9700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2350ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph009"
},
{
"model": "s5310hi",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300li",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph003"
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph009"
},
{
"model": "s5720hi",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s7700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5720ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s3300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s3300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5720ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph009"
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5720ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5310hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph003"
},
{
"model": "s5720hi",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s7700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s2300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s9700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph003"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s7700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5300si",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720ei 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720ei",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:s2300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2350ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2350ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300li",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300li_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300si",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300si_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5310hi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5310hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5720ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5720ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5720hi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5720hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s6300ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s7700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported the issue.",
"sources": [
{
"db": "BID",
"id": "90912"
}
],
"trust": 0.3
},
"cve": "CVE-2015-8677",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "CVE-2015-8677",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "CNVD-2016-02289",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "VHN-86638",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.8,
"id": "CVE-2015-8677",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-8677",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-8677",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2016-02289",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201604-314",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-86638",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2015-8677",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "VULHUB",
"id": "VHN-86638"
},
{
"db": "VULMON",
"id": "CVE-2015-8677"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information. HuaweiS5300EI is a Huawei S series switch product. A number of Huawei products have a memory leak vulnerability in the HTTPS or SFTP server, allowing remote attackers to consume memory and log in and out of the HTTPS or SFTP server for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to cause a memory exhaustion, denying service to legitimate users. The Huawei S5300EI and others are all S-series switch products of China\u0027s Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: using V200R003C00 version and V200R005C00 version software Huawei S5300EI , S5300SI , S5310HI , S6300EI ,use V200R003C00 Version, V200R005C00 version and V200R006C00 version software Huawei S2350EI , S5300LI , S9300 , S7700 , S9700 ,use V200R006C00 version software Huawei S5720HI, S5720EI, Huawei S2300, S3300 using V100R006C05 software",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8677"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "BID",
"id": "90912"
},
{
"db": "VULHUB",
"id": "VHN-86638"
},
{
"db": "VULMON",
"id": "CVE-2015-8677"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8677",
"trust": 3.5
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-02289",
"trust": 0.6
},
{
"db": "BID",
"id": "90912",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-86638",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2015-8677",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "VULHUB",
"id": "VHN-86638"
},
{
"db": "VULMON",
"id": "CVE-2015-8677"
},
{
"db": "BID",
"id": "90912"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"id": "VAR-201604-0328",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "VULHUB",
"id": "VHN-86638"
}
],
"trust": 1.61575809
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
}
]
},
"last_update_date": "2025-04-13T23:18:00.533000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20160113-03-Switch",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
},
{
"title": "Patches for various Huawei product switch memory leak vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/74355"
},
{
"title": "Multiple Huawei Product memory leak vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60969"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86638"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8677"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8677"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/399.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.securityfocus.com/bid/90912"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "VULHUB",
"id": "VHN-86638"
},
{
"db": "VULMON",
"id": "CVE-2015-8677"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "VULHUB",
"id": "VHN-86638"
},
{
"db": "VULMON",
"id": "CVE-2015-8677"
},
{
"db": "BID",
"id": "90912"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"date": "2016-04-14T00:00:00",
"db": "VULHUB",
"id": "VHN-86638"
},
{
"date": "2016-04-14T00:00:00",
"db": "VULMON",
"id": "CVE-2015-8677"
},
{
"date": "2016-01-13T00:00:00",
"db": "BID",
"id": "90912"
},
{
"date": "2016-05-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"date": "2016-04-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"date": "2016-04-14T15:59:03.857000",
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"date": "2019-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-86638"
},
{
"date": "2019-06-20T00:00:00",
"db": "VULMON",
"id": "CVE-2015-8677"
},
{
"date": "2016-07-06T14:51:00",
"db": "BID",
"id": "90912"
},
{
"date": "2016-05-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"date": "2016-04-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Service disruption in products (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
}
],
"trust": 0.6
}
}