Search criteria
88 vulnerabilities found for s5700_firmware by huawei
CVE-2021-37129 (GCVE-0-2021-37129)
Vulnerability from nvd – Published: 2021-10-27 00:41 – Updated: 2024-08-04 01:16
VLAI?
Summary
There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.
Severity ?
No CVSS data available.
CWE
- Out of Bounds Write
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500 |
Affected:
V500R005C00,V500R005C20
Affected: V500R005C00 Affected: V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10 Affected: V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600 Affected: V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500 Affected: V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T01:16:03.167Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V500R005C00,V500R005C20"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10"
},
{
"status": "affected",
"version": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600"
},
{
"status": "affected",
"version": "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500"
},
{
"status": "affected",
"version": "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Out of Bounds Write",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-27T00:41:44",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2021-37129",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500",
"version": {
"version_data": [
{
"version_value": "V500R005C00,V500R005C20"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R005C00,V500R005C20"
},
{
"version_value": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10"
},
{
"version_value": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600"
},
{
"version_value": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600"
},
{
"version_value": "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500"
},
{
"version_value": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600"
},
{
"version_value": "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600"
},
{
"version_value": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600"
},
{
"version_value": "V500R005C00,V500R005C20"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out of Bounds Write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2021-37129",
"datePublished": "2021-10-27T00:41:44",
"dateReserved": "2021-07-20T00:00:00",
"dateUpdated": "2024-08-04T01:16:03.167Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-22357 (GCVE-0-2021-22357)
Vulnerability from nvd – Published: 2021-08-23 19:30 – Updated: 2024-08-03 18:37
VLAI?
Summary
There is a denial of service vulnerability in Huawei products. A module cannot deal with specific messages due to validating inputs insufficiently. Attackers can exploit this vulnerability by sending specific messages to affected module. This can cause denial of service. Affected product versions include: S12700 V200R013C00SPC500, V200R019C00SPC500; S5700 V200R013C00SPC500, V200R019C00SPC500; S6700 V200R013C00SPC500, V200R019C00SPC500; S7700 V200R013C00SPC500, V200R019C00SPC500.
Severity ?
No CVSS data available.
CWE
- Denial of Service
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | S12700;S5700;S6700;S7700 |
Affected:
V200R013C00SPC500,V200R019C00SPC500
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:37:18.585Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-dos-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "S12700;S5700;S6700;S7700",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R013C00SPC500,V200R019C00SPC500"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is a denial of service vulnerability in Huawei products. A module cannot deal with specific messages due to validating inputs insufficiently. Attackers can exploit this vulnerability by sending specific messages to affected module. This can cause denial of service. Affected product versions include: S12700 V200R013C00SPC500, V200R019C00SPC500; S5700 V200R013C00SPC500, V200R019C00SPC500; S6700 V200R013C00SPC500, V200R019C00SPC500; S7700 V200R013C00SPC500, V200R019C00SPC500."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-23T19:30:58",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-dos-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2021-22357",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "S12700;S5700;S6700;S7700",
"version": {
"version_data": [
{
"version_value": "V200R013C00SPC500,V200R019C00SPC500"
},
{
"version_value": "V200R013C00SPC500,V200R019C00SPC500"
},
{
"version_value": "V200R013C00SPC500,V200R019C00SPC500"
},
{
"version_value": "V200R013C00SPC500,V200R019C00SPC500"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is a denial of service vulnerability in Huawei products. A module cannot deal with specific messages due to validating inputs insufficiently. Attackers can exploit this vulnerability by sending specific messages to affected module. This can cause denial of service. Affected product versions include: S12700 V200R013C00SPC500, V200R019C00SPC500; S5700 V200R013C00SPC500, V200R019C00SPC500; S6700 V200R013C00SPC500, V200R019C00SPC500; S7700 V200R013C00SPC500, V200R019C00SPC500."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-dos-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-dos-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2021-22357",
"datePublished": "2021-08-23T19:30:58",
"dateReserved": "2021-01-05T00:00:00",
"dateUpdated": "2024-08-03T18:37:18.585Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-22329 (GCVE-0-2021-22329)
Vulnerability from nvd – Published: 2021-06-29 19:05 – Updated: 2024-08-03 18:37
VLAI?
Summary
There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10.
Severity ?
No CVSS data available.
CWE
- Improper Licenses Management
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | S12700;S1700;S2700;S5700;S6700;S7700;S9700 |
Affected:
V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10
Affected: V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10 Affected: V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10 Affected: V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:37:18.594Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "S12700;S1700;S2700;S5700;S6700;S7700;S9700",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"status": "affected",
"version": "V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"status": "affected",
"version": "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"status": "affected",
"version": "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Licenses Management",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-29T19:05:31",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2021-22329",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "S12700;S1700;S2700;S5700;S6700;S7700;S9700",
"version": {
"version_data": [
{
"version_value": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
},
{
"version_value": "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
},
{
"version_value": "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Licenses Management"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2021-22329",
"datePublished": "2021-06-29T19:05:31",
"dateReserved": "2021-01-05T00:00:00",
"dateUpdated": "2024-08-03T18:37:18.594Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-22377 (GCVE-0-2021-22377)
Vulnerability from nvd – Published: 2021-06-22 18:10 – Updated: 2024-08-03 18:44
VLAI?
Summary
There is a command injection vulnerability in S12700 V200R019C00SPC500, S2700 V200R019C00SPC500, S5700 V200R019C00SPC500, S6700 V200R019C00SPC500 and S7700 V200R019C00SPC500. A module does not verify specific input sufficiently. Attackers can exploit this vulnerability by sending malicious parameters to inject command. This can compromise normal service.
Severity ?
No CVSS data available.
CWE
- Command Injection
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | S12700;S2700;S5700;S6700;S7700 |
Affected:
V200R019C00SPC500
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:44:12.337Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210602-01-cmdinj-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "S12700;S2700;S5700;S6700;S7700",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R019C00SPC500"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is a command injection vulnerability in S12700 V200R019C00SPC500, S2700 V200R019C00SPC500, S5700 V200R019C00SPC500, S6700 V200R019C00SPC500 and S7700 V200R019C00SPC500. A module does not verify specific input sufficiently. Attackers can exploit this vulnerability by sending malicious parameters to inject command. This can compromise normal service."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Command Injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-22T18:10:10",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210602-01-cmdinj-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2021-22377",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "S12700;S2700;S5700;S6700;S7700",
"version": {
"version_data": [
{
"version_value": "V200R019C00SPC500"
},
{
"version_value": "V200R019C00SPC500"
},
{
"version_value": "V200R019C00SPC500"
},
{
"version_value": "V200R019C00SPC500"
},
{
"version_value": "V200R019C00SPC500"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is a command injection vulnerability in S12700 V200R019C00SPC500, S2700 V200R019C00SPC500, S5700 V200R019C00SPC500, S6700 V200R019C00SPC500 and S7700 V200R019C00SPC500. A module does not verify specific input sufficiently. Attackers can exploit this vulnerability by sending malicious parameters to inject command. This can compromise normal service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210602-01-cmdinj-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210602-01-cmdinj-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2021-22377",
"datePublished": "2021-06-22T18:10:10",
"dateReserved": "2021-01-05T00:00:00",
"dateUpdated": "2024-08-03T18:44:12.337Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-22359 (GCVE-0-2021-22359)
Vulnerability from nvd – Published: 2021-05-27 12:40 – Updated: 2024-08-03 18:44
VLAI?
Summary
There is a denial of service vulnerability in the verisions V200R005C00SPC500 of S5700 and V200R005C00SPC500 of S6700. An attacker could exploit this vulnerability by sending specific message to a targeted device. Due to insufficient input validation, successful exploit can cause the service abnormal.
Severity ?
No CVSS data available.
CWE
- Denial of Service
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | S5700;S6700 |
Affected:
V200R005C00SPC500
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:44:12.185Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-02-dos-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "S5700;S6700",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C00SPC500"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is a denial of service vulnerability in the verisions V200R005C00SPC500 of S5700 and V200R005C00SPC500 of S6700. An attacker could exploit this vulnerability by sending specific message to a targeted device. Due to insufficient input validation, successful exploit can cause the service abnormal."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-27T12:40:09",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-02-dos-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2021-22359",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "S5700;S6700",
"version": {
"version_data": [
{
"version_value": "V200R005C00SPC500"
},
{
"version_value": "V200R005C00SPC500"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is a denial of service vulnerability in the verisions V200R005C00SPC500 of S5700 and V200R005C00SPC500 of S6700. An attacker could exploit this vulnerability by sending specific message to a targeted device. Due to insufficient input validation, successful exploit can cause the service abnormal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-02-dos-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-02-dos-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2021-22359",
"datePublished": "2021-05-27T12:40:09",
"dateReserved": "2021-01-05T00:00:00",
"dateUpdated": "2024-08-03T18:44:12.185Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-22321 (GCVE-0-2021-22321)
Vulnerability from nvd – Published: 2021-03-22 19:03 – Updated: 2024-08-03 18:37
VLAI?
Summary
There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.
Severity ?
No CVSS data available.
CWE
- Use After Free
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 |
Affected:
V500R001C30,V500R001C60
Affected: V500R001C30 Affected: V500R001C60 Affected: V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10 Affected: V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10 Affected: V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10 Affected: V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:37:18.499Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V500R001C30,V500R001C60"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"status": "affected",
"version": "V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"status": "affected",
"version": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"status": "affected",
"version": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Use After Free",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-22T19:03:52",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2021-22321",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
"version": {
"version_data": [
{
"version_value": "V500R001C30,V500R001C60"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
},
{
"version_value": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
},
{
"version_value": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V500R001C30,V500R001C60"
},
{
"version_value": "V500R001C30,V500R001C60"
},
{
"version_value": "V500R001C30,V500R001C60"
},
{
"version_value": "V500R001C30,V500R001C60"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use After Free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2021-22321",
"datePublished": "2021-03-22T19:03:52",
"dateReserved": "2021-01-05T00:00:00",
"dateUpdated": "2024-08-03T18:37:18.499Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-1866 (GCVE-0-2020-1866)
Vulnerability from nvd – Published: 2021-01-13 22:22 – Updated: 2024-08-04 06:53
VLAI?
Summary
There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.
Severity ?
No CVSS data available.
CWE
- Out of Bounds Read
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500 |
Affected:
V500R001C30,V500R001C60SPC500,V500R005C00
Affected: V200R008C00 Affected: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00 Affected: V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:53:59.744Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V500R001C30,V500R001C60SPC500,V500R005C00"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00"
},
{
"status": "affected",
"version": "V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Out of Bounds Read",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-13T22:22:04",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2020-1866",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500",
"version": {
"version_data": [
{
"version_value": "V500R001C30,V500R001C60SPC500,V500R005C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00"
},
{
"version_value": "V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out of Bounds Read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2020-1866",
"datePublished": "2021-01-13T22:22:04",
"dateReserved": "2019-11-29T00:00:00",
"dateUpdated": "2024-08-04T06:53:59.744Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-1810 (GCVE-0-2020-1810)
Vulnerability from nvd – Published: 2020-01-09 17:44 – Updated: 2024-08-04 06:46
VLAI?
Summary
There is a weak algorithm vulnerability in some Huawei products. The affected products use the RSA algorithm in the SSL key exchange algorithm which have been considered as a weak algorithm. Attackers may exploit this vulnerability to leak some information.
Severity ?
No CVSS data available.
CWE
- Weak Algorithm
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | CloudEngine 12800;S5700;S6700 |
Affected:
V100R003C00SPC600,V100R003C10SPC100,V100R005C00SPC200,V100R005C00SPC300,V100R005C10HP0001,V100R005C10SPC100,V100R005C10SPC200,V100R006C00,V200R001C00,V200R002C01,V200R002C10,V200R002C20,V200R005C10
Affected: V200R005C00SPC500,V200R005C03,V200R006C00SPC100,V200R006C00SPC300,V200R006C00SPC500,V200R007C00SPC100,V200R007C00SPC500 Affected: V200R005C00SPC500,V200R005C01 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:46:30.887Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-rsa-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CloudEngine 12800;S5700;S6700",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V100R003C00SPC600,V100R003C10SPC100,V100R005C00SPC200,V100R005C00SPC300,V100R005C10HP0001,V100R005C10SPC100,V100R005C10SPC200,V100R006C00,V200R001C00,V200R002C01,V200R002C10,V200R002C20,V200R005C10"
},
{
"status": "affected",
"version": "V200R005C00SPC500,V200R005C03,V200R006C00SPC100,V200R006C00SPC300,V200R006C00SPC500,V200R007C00SPC100,V200R007C00SPC500"
},
{
"status": "affected",
"version": "V200R005C00SPC500,V200R005C01"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is a weak algorithm vulnerability in some Huawei products. The affected products use the RSA algorithm in the SSL key exchange algorithm which have been considered as a weak algorithm. Attackers may exploit this vulnerability to leak some information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Weak Algorithm",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-01-21T23:00:44",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-rsa-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2020-1810",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CloudEngine 12800;S5700;S6700",
"version": {
"version_data": [
{
"version_value": "V100R003C00SPC600,V100R003C10SPC100,V100R005C00SPC200,V100R005C00SPC300,V100R005C10HP0001,V100R005C10SPC100,V100R005C10SPC200,V100R006C00,V200R001C00,V200R002C01,V200R002C10,V200R002C20,V200R005C10"
},
{
"version_value": "V200R005C00SPC500,V200R005C03,V200R006C00SPC100,V200R006C00SPC300,V200R006C00SPC500,V200R007C00SPC100,V200R007C00SPC500"
},
{
"version_value": "V200R005C00SPC500,V200R005C01"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is a weak algorithm vulnerability in some Huawei products. The affected products use the RSA algorithm in the SSL key exchange algorithm which have been considered as a weak algorithm. Attackers may exploit this vulnerability to leak some information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Weak Algorithm"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-rsa-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-rsa-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2020-1810",
"datePublished": "2020-01-09T17:44:54",
"dateReserved": "2019-11-29T00:00:00",
"dateUpdated": "2024-08-04T06:46:30.887Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5304 (GCVE-0-2019-5304)
Vulnerability from nvd – Published: 2020-01-03 14:33 – Updated: 2024-08-04 19:54
VLAI?
Summary
Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.
Severity ?
No CVSS data available.
CWE
- Buffer Error
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;IPS Module;NGFW Module;NIP6300;NIP6600;NetEngine16EX;S5700;S6700;SRG1300;SRG2300;SRG3300;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600 |
Affected:
V200R006C10
Affected: V200R007C00 Affected: V200R008C20 Affected: V200R008C50 Affected: V200R003C01 Affected: V200R005C20 Affected: V500R001C20 Affected: V500R001C30 Affected: V500R002C00 Affected: V200R005C00 Affected: V200R005C02 Affected: V200R005C03 Affected: V200R006C00 Affected: V200R008C00 Affected: V200R010C00 Affected: V200R011C00 Affected: V200R005C01 Affected: V500R001C60 Affected: V500R005C00 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:54:53.290Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;IPS Module;NGFW Module;NIP6300;NIP6600;NetEngine16EX;S5700;S6700;SRG1300;SRG2300;SRG3300;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R007C00"
},
{
"status": "affected",
"version": "V200R008C20"
},
{
"status": "affected",
"version": "V200R008C50"
},
{
"status": "affected",
"version": "V200R003C01"
},
{
"status": "affected",
"version": "V200R005C20"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V200R005C00"
},
{
"status": "affected",
"version": "V200R005C02"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R006C00"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R010C00"
},
{
"status": "affected",
"version": "V200R011C00"
},
{
"status": "affected",
"version": "V200R005C01"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R005C00"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Buffer Error",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-01-03T14:33:41",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5304",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;IPS Module;NGFW Module;NIP6300;NIP6600;NetEngine16EX;S5700;S6700;SRG1300;SRG2300;SRG3300;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600",
"version": {
"version_data": [
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R007C00"
},
{
"version_value": "V200R008C20"
},
{
"version_value": "V200R008C50"
},
{
"version_value": "V200R003C01"
},
{
"version_value": "V200R005C20"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V200R005C00"
},
{
"version_value": "V200R005C02"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R006C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R010C00"
},
{
"version_value": "V200R011C00"
},
{
"version_value": "V200R005C01"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R005C00"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Buffer Error"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5304",
"datePublished": "2020-01-03T14:33:41",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:54:53.290Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5258 (GCVE-0-2019-5258)
Vulnerability from nvd – Published: 2019-12-13 22:41 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.
Severity ?
No CVSS data available.
CWE
- buffer overflow
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.829Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "buffer overflow",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:41:04",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5258",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "buffer overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5258",
"datePublished": "2019-12-13T22:41:04",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.829Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5257 (GCVE-0-2019-5257)
Vulnerability from nvd – Published: 2019-12-13 22:16 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network.
Severity ?
No CVSS data available.
CWE
- resource management
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.752Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "resource management",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:16:22",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5257",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "resource management"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5257",
"datePublished": "2019-12-13T22:16:22",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.752Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5256 (GCVE-0-2019-5256)
Vulnerability from nvd – Published: 2019-12-13 22:45 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot.
Severity ?
No CVSS data available.
CWE
- null pointer dereference
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.652Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "null pointer dereference",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:45:34",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5256",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "null pointer dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5256",
"datePublished": "2019-12-13T22:45:34",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.652Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5255 (GCVE-0-2019-5255)
Vulnerability from nvd – Published: 2019-12-13 22:48 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service.
Severity ?
No CVSS data available.
CWE
- DoS
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.961Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "DoS",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:48:31",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5255",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "DoS"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5255",
"datePublished": "2019-12-13T22:48:31",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.961Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5254 (GCVE-0-2019-5254)
Vulnerability from nvd – Published: 2019-12-13 22:51 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.
Severity ?
No CVSS data available.
CWE
- out-of-bounds read
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.865Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "out-of-bounds read",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:51:29",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5254",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "out-of-bounds read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5254",
"datePublished": "2019-12-13T22:51:29",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.865Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5290 (GCVE-0-2019-5290)
Vulnerability from nvd – Published: 2019-12-13 14:47 – Updated: 2024-08-04 19:54
VLAI?
Summary
Huawei S5700 and S6700 have a DoS security vulnerability. Attackers with certain permissions perform specific operations on affected devices. Because the pointer in the program is not processed properly, the vulnerability can be exploited to cause the device to be abnormal.
Severity ?
No CVSS data available.
CWE
- DoS
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | S5700;S6700 |
Affected:
V200R005C00SPC500
Affected: V200R005C02 Affected: V200R005C03 Affected: V200R006C00SPC100 Affected: V200R006C00SPC300 Affected: V200R006C00SPC500 Affected: V200R007C00SPC100 Affected: V200R007C00SPC500 Affected: V200R008C00 Affected: V200R005C01 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:54:52.394Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-02-dos-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "S5700;S6700",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C00SPC500"
},
{
"status": "affected",
"version": "V200R005C02"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R006C00SPC100"
},
{
"status": "affected",
"version": "V200R006C00SPC300"
},
{
"status": "affected",
"version": "V200R006C00SPC500"
},
{
"status": "affected",
"version": "V200R007C00SPC100"
},
{
"status": "affected",
"version": "V200R007C00SPC500"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R005C01"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Huawei S5700 and S6700 have a DoS security vulnerability. Attackers with certain permissions perform specific operations on affected devices. Because the pointer in the program is not processed properly, the vulnerability can be exploited to cause the device to be abnormal."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "DoS",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T14:47:00",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-02-dos-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5290",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "S5700;S6700",
"version": {
"version_data": [
{
"version_value": "V200R005C00SPC500"
},
{
"version_value": "V200R005C02"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R006C00SPC100"
},
{
"version_value": "V200R006C00SPC300"
},
{
"version_value": "V200R006C00SPC500"
},
{
"version_value": "V200R007C00SPC100"
},
{
"version_value": "V200R007C00SPC500"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R005C01"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Huawei S5700 and S6700 have a DoS security vulnerability. Attackers with certain permissions perform specific operations on affected devices. Because the pointer in the program is not processed properly, the vulnerability can be exploited to cause the device to be abnormal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "DoS"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-02-dos-en",
"refsource": "MISC",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-02-dos-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5290",
"datePublished": "2019-12-13T14:47:00",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:54:52.394Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-19397 (GCVE-0-2019-19397)
Vulnerability from nvd – Published: 2019-12-13 14:19 – Updated: 2024-08-05 02:16
VLAI?
Summary
There is a weak algorithm vulnerability in some Huawei products. The affected products use weak algorithms by default. Attackers may exploit the vulnerability to cause information leaks.
Severity ?
No CVSS data available.
CWE
- Weak Algorithm
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | S12700;S1700;S2700;S5700;S6700;S7700;S9700 |
Affected:
V200R007C00
Affected: V200R007C01 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R010C00 Affected: V200R011C10 Affected: V200R012C00 Affected: V200R006C10 Affected: V200R012C20 Affected: V200R006C00 Affected: V200R011C00 Affected: V200R005C00 Affected: V200R005C02 Affected: V200R005C03 Affected: V200R005C01 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T02:16:47.108Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-vrp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "S12700;S1700;S2700;S5700;S6700;S7700;S9700",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R007C00"
},
{
"status": "affected",
"version": "V200R007C01"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R010C00"
},
{
"status": "affected",
"version": "V200R011C10"
},
{
"status": "affected",
"version": "V200R012C00"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R012C20"
},
{
"status": "affected",
"version": "V200R006C00"
},
{
"status": "affected",
"version": "V200R011C00"
},
{
"status": "affected",
"version": "V200R005C00"
},
{
"status": "affected",
"version": "V200R005C02"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R005C01"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is a weak algorithm vulnerability in some Huawei products. The affected products use weak algorithms by default. Attackers may exploit the vulnerability to cause information leaks."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Weak Algorithm",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T14:19:12",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-vrp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-19397",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "S12700;S1700;S2700;S5700;S6700;S7700;S9700",
"version": {
"version_data": [
{
"version_value": "V200R007C00"
},
{
"version_value": "V200R007C01"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R010C00"
},
{
"version_value": "V200R011C10"
},
{
"version_value": "V200R012C00"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R012C20"
},
{
"version_value": "V200R006C00"
},
{
"version_value": "V200R011C00"
},
{
"version_value": "V200R005C00"
},
{
"version_value": "V200R005C02"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R005C01"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is a weak algorithm vulnerability in some Huawei products. The affected products use weak algorithms by default. Attackers may exploit the vulnerability to cause information leaks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Weak Algorithm"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-vrp-en",
"refsource": "MISC",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-vrp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-19397",
"datePublished": "2019-12-13T14:19:12",
"dateReserved": "2019-11-29T00:00:00",
"dateUpdated": "2024-08-05T02:16:47.108Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-37129 (GCVE-0-2021-37129)
Vulnerability from cvelistv5 – Published: 2021-10-27 00:41 – Updated: 2024-08-04 01:16
VLAI?
Summary
There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.
Severity ?
No CVSS data available.
CWE
- Out of Bounds Write
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500 |
Affected:
V500R005C00,V500R005C20
Affected: V500R005C00 Affected: V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10 Affected: V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600 Affected: V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500 Affected: V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T01:16:03.167Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V500R005C00,V500R005C20"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10"
},
{
"status": "affected",
"version": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600"
},
{
"status": "affected",
"version": "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500"
},
{
"status": "affected",
"version": "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Out of Bounds Write",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-27T00:41:44",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2021-37129",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500",
"version": {
"version_data": [
{
"version_value": "V500R005C00,V500R005C20"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R005C00,V500R005C20"
},
{
"version_value": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10"
},
{
"version_value": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600"
},
{
"version_value": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600"
},
{
"version_value": "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500"
},
{
"version_value": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600"
},
{
"version_value": "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600"
},
{
"version_value": "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600"
},
{
"version_value": "V500R005C00,V500R005C20"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out of Bounds Write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2021-37129",
"datePublished": "2021-10-27T00:41:44",
"dateReserved": "2021-07-20T00:00:00",
"dateUpdated": "2024-08-04T01:16:03.167Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-22357 (GCVE-0-2021-22357)
Vulnerability from cvelistv5 – Published: 2021-08-23 19:30 – Updated: 2024-08-03 18:37
VLAI?
Summary
There is a denial of service vulnerability in Huawei products. A module cannot deal with specific messages due to validating inputs insufficiently. Attackers can exploit this vulnerability by sending specific messages to affected module. This can cause denial of service. Affected product versions include: S12700 V200R013C00SPC500, V200R019C00SPC500; S5700 V200R013C00SPC500, V200R019C00SPC500; S6700 V200R013C00SPC500, V200R019C00SPC500; S7700 V200R013C00SPC500, V200R019C00SPC500.
Severity ?
No CVSS data available.
CWE
- Denial of Service
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | S12700;S5700;S6700;S7700 |
Affected:
V200R013C00SPC500,V200R019C00SPC500
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:37:18.585Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-dos-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "S12700;S5700;S6700;S7700",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R013C00SPC500,V200R019C00SPC500"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is a denial of service vulnerability in Huawei products. A module cannot deal with specific messages due to validating inputs insufficiently. Attackers can exploit this vulnerability by sending specific messages to affected module. This can cause denial of service. Affected product versions include: S12700 V200R013C00SPC500, V200R019C00SPC500; S5700 V200R013C00SPC500, V200R019C00SPC500; S6700 V200R013C00SPC500, V200R019C00SPC500; S7700 V200R013C00SPC500, V200R019C00SPC500."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-23T19:30:58",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-dos-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2021-22357",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "S12700;S5700;S6700;S7700",
"version": {
"version_data": [
{
"version_value": "V200R013C00SPC500,V200R019C00SPC500"
},
{
"version_value": "V200R013C00SPC500,V200R019C00SPC500"
},
{
"version_value": "V200R013C00SPC500,V200R019C00SPC500"
},
{
"version_value": "V200R013C00SPC500,V200R019C00SPC500"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is a denial of service vulnerability in Huawei products. A module cannot deal with specific messages due to validating inputs insufficiently. Attackers can exploit this vulnerability by sending specific messages to affected module. This can cause denial of service. Affected product versions include: S12700 V200R013C00SPC500, V200R019C00SPC500; S5700 V200R013C00SPC500, V200R019C00SPC500; S6700 V200R013C00SPC500, V200R019C00SPC500; S7700 V200R013C00SPC500, V200R019C00SPC500."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-dos-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-dos-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2021-22357",
"datePublished": "2021-08-23T19:30:58",
"dateReserved": "2021-01-05T00:00:00",
"dateUpdated": "2024-08-03T18:37:18.585Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-22329 (GCVE-0-2021-22329)
Vulnerability from cvelistv5 – Published: 2021-06-29 19:05 – Updated: 2024-08-03 18:37
VLAI?
Summary
There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10.
Severity ?
No CVSS data available.
CWE
- Improper Licenses Management
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | S12700;S1700;S2700;S5700;S6700;S7700;S9700 |
Affected:
V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10
Affected: V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10 Affected: V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10 Affected: V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:37:18.594Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "S12700;S1700;S2700;S5700;S6700;S7700;S9700",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"status": "affected",
"version": "V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"status": "affected",
"version": "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"status": "affected",
"version": "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Licenses Management",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-29T19:05:31",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2021-22329",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "S12700;S1700;S2700;S5700;S6700;S7700;S9700",
"version": {
"version_data": [
{
"version_value": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
},
{
"version_value": "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
},
{
"version_value": "V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There has a license management vulnerability in some Huawei products. An attacker with high privilege needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper license management of the device, as a result, the license file can be applied and affect integrity of the device. Affected product versions include:S12700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S1700 V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S2700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S5700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S6700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100;S7700 V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10;S9700 V200R007C01,V200R007C01B102,V200R008C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Licenses Management"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-resourcemanagement-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2021-22329",
"datePublished": "2021-06-29T19:05:31",
"dateReserved": "2021-01-05T00:00:00",
"dateUpdated": "2024-08-03T18:37:18.594Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-22377 (GCVE-0-2021-22377)
Vulnerability from cvelistv5 – Published: 2021-06-22 18:10 – Updated: 2024-08-03 18:44
VLAI?
Summary
There is a command injection vulnerability in S12700 V200R019C00SPC500, S2700 V200R019C00SPC500, S5700 V200R019C00SPC500, S6700 V200R019C00SPC500 and S7700 V200R019C00SPC500. A module does not verify specific input sufficiently. Attackers can exploit this vulnerability by sending malicious parameters to inject command. This can compromise normal service.
Severity ?
No CVSS data available.
CWE
- Command Injection
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | S12700;S2700;S5700;S6700;S7700 |
Affected:
V200R019C00SPC500
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:44:12.337Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210602-01-cmdinj-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "S12700;S2700;S5700;S6700;S7700",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R019C00SPC500"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is a command injection vulnerability in S12700 V200R019C00SPC500, S2700 V200R019C00SPC500, S5700 V200R019C00SPC500, S6700 V200R019C00SPC500 and S7700 V200R019C00SPC500. A module does not verify specific input sufficiently. Attackers can exploit this vulnerability by sending malicious parameters to inject command. This can compromise normal service."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Command Injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-22T18:10:10",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210602-01-cmdinj-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2021-22377",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "S12700;S2700;S5700;S6700;S7700",
"version": {
"version_data": [
{
"version_value": "V200R019C00SPC500"
},
{
"version_value": "V200R019C00SPC500"
},
{
"version_value": "V200R019C00SPC500"
},
{
"version_value": "V200R019C00SPC500"
},
{
"version_value": "V200R019C00SPC500"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is a command injection vulnerability in S12700 V200R019C00SPC500, S2700 V200R019C00SPC500, S5700 V200R019C00SPC500, S6700 V200R019C00SPC500 and S7700 V200R019C00SPC500. A module does not verify specific input sufficiently. Attackers can exploit this vulnerability by sending malicious parameters to inject command. This can compromise normal service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210602-01-cmdinj-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210602-01-cmdinj-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2021-22377",
"datePublished": "2021-06-22T18:10:10",
"dateReserved": "2021-01-05T00:00:00",
"dateUpdated": "2024-08-03T18:44:12.337Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-22359 (GCVE-0-2021-22359)
Vulnerability from cvelistv5 – Published: 2021-05-27 12:40 – Updated: 2024-08-03 18:44
VLAI?
Summary
There is a denial of service vulnerability in the verisions V200R005C00SPC500 of S5700 and V200R005C00SPC500 of S6700. An attacker could exploit this vulnerability by sending specific message to a targeted device. Due to insufficient input validation, successful exploit can cause the service abnormal.
Severity ?
No CVSS data available.
CWE
- Denial of Service
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | S5700;S6700 |
Affected:
V200R005C00SPC500
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:44:12.185Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-02-dos-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "S5700;S6700",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C00SPC500"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is a denial of service vulnerability in the verisions V200R005C00SPC500 of S5700 and V200R005C00SPC500 of S6700. An attacker could exploit this vulnerability by sending specific message to a targeted device. Due to insufficient input validation, successful exploit can cause the service abnormal."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-27T12:40:09",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-02-dos-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2021-22359",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "S5700;S6700",
"version": {
"version_data": [
{
"version_value": "V200R005C00SPC500"
},
{
"version_value": "V200R005C00SPC500"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is a denial of service vulnerability in the verisions V200R005C00SPC500 of S5700 and V200R005C00SPC500 of S6700. An attacker could exploit this vulnerability by sending specific message to a targeted device. Due to insufficient input validation, successful exploit can cause the service abnormal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-02-dos-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-02-dos-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2021-22359",
"datePublished": "2021-05-27T12:40:09",
"dateReserved": "2021-01-05T00:00:00",
"dateUpdated": "2024-08-03T18:44:12.185Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-22321 (GCVE-0-2021-22321)
Vulnerability from cvelistv5 – Published: 2021-03-22 19:03 – Updated: 2024-08-03 18:37
VLAI?
Summary
There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.
Severity ?
No CVSS data available.
CWE
- Use After Free
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 |
Affected:
V500R001C30,V500R001C60
Affected: V500R001C30 Affected: V500R001C60 Affected: V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10 Affected: V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10 Affected: V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10 Affected: V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:37:18.499Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V500R001C30,V500R001C60"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"status": "affected",
"version": "V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"status": "affected",
"version": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"status": "affected",
"version": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Use After Free",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-22T19:03:52",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2021-22321",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
"version": {
"version_data": [
{
"version_value": "V500R001C30,V500R001C60"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
},
{
"version_value": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100"
},
{
"version_value": "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10"
},
{
"version_value": "V500R001C30,V500R001C60"
},
{
"version_value": "V500R001C30,V500R001C60"
},
{
"version_value": "V500R001C30,V500R001C60"
},
{
"version_value": "V500R001C30,V500R001C60"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use After Free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2021-22321",
"datePublished": "2021-03-22T19:03:52",
"dateReserved": "2021-01-05T00:00:00",
"dateUpdated": "2024-08-03T18:37:18.499Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-1866 (GCVE-0-2020-1866)
Vulnerability from cvelistv5 – Published: 2021-01-13 22:22 – Updated: 2024-08-04 06:53
VLAI?
Summary
There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.
Severity ?
No CVSS data available.
CWE
- Out of Bounds Read
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500 |
Affected:
V500R001C30,V500R001C60SPC500,V500R005C00
Affected: V200R008C00 Affected: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00 Affected: V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:53:59.744Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V500R001C30,V500R001C60SPC500,V500R005C00"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00"
},
{
"status": "affected",
"version": "V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Out of Bounds Read",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-13T22:22:04",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2020-1866",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500",
"version": {
"version_data": [
{
"version_value": "V500R001C30,V500R001C60SPC500,V500R005C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00"
},
{
"version_value": "V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out of Bounds Read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2020-1866",
"datePublished": "2021-01-13T22:22:04",
"dateReserved": "2019-11-29T00:00:00",
"dateUpdated": "2024-08-04T06:53:59.744Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-1810 (GCVE-0-2020-1810)
Vulnerability from cvelistv5 – Published: 2020-01-09 17:44 – Updated: 2024-08-04 06:46
VLAI?
Summary
There is a weak algorithm vulnerability in some Huawei products. The affected products use the RSA algorithm in the SSL key exchange algorithm which have been considered as a weak algorithm. Attackers may exploit this vulnerability to leak some information.
Severity ?
No CVSS data available.
CWE
- Weak Algorithm
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | CloudEngine 12800;S5700;S6700 |
Affected:
V100R003C00SPC600,V100R003C10SPC100,V100R005C00SPC200,V100R005C00SPC300,V100R005C10HP0001,V100R005C10SPC100,V100R005C10SPC200,V100R006C00,V200R001C00,V200R002C01,V200R002C10,V200R002C20,V200R005C10
Affected: V200R005C00SPC500,V200R005C03,V200R006C00SPC100,V200R006C00SPC300,V200R006C00SPC500,V200R007C00SPC100,V200R007C00SPC500 Affected: V200R005C00SPC500,V200R005C01 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:46:30.887Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-rsa-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CloudEngine 12800;S5700;S6700",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V100R003C00SPC600,V100R003C10SPC100,V100R005C00SPC200,V100R005C00SPC300,V100R005C10HP0001,V100R005C10SPC100,V100R005C10SPC200,V100R006C00,V200R001C00,V200R002C01,V200R002C10,V200R002C20,V200R005C10"
},
{
"status": "affected",
"version": "V200R005C00SPC500,V200R005C03,V200R006C00SPC100,V200R006C00SPC300,V200R006C00SPC500,V200R007C00SPC100,V200R007C00SPC500"
},
{
"status": "affected",
"version": "V200R005C00SPC500,V200R005C01"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There is a weak algorithm vulnerability in some Huawei products. The affected products use the RSA algorithm in the SSL key exchange algorithm which have been considered as a weak algorithm. Attackers may exploit this vulnerability to leak some information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Weak Algorithm",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-01-21T23:00:44",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-rsa-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2020-1810",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CloudEngine 12800;S5700;S6700",
"version": {
"version_data": [
{
"version_value": "V100R003C00SPC600,V100R003C10SPC100,V100R005C00SPC200,V100R005C00SPC300,V100R005C10HP0001,V100R005C10SPC100,V100R005C10SPC200,V100R006C00,V200R001C00,V200R002C01,V200R002C10,V200R002C20,V200R005C10"
},
{
"version_value": "V200R005C00SPC500,V200R005C03,V200R006C00SPC100,V200R006C00SPC300,V200R006C00SPC500,V200R007C00SPC100,V200R007C00SPC500"
},
{
"version_value": "V200R005C00SPC500,V200R005C01"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There is a weak algorithm vulnerability in some Huawei products. The affected products use the RSA algorithm in the SSL key exchange algorithm which have been considered as a weak algorithm. Attackers may exploit this vulnerability to leak some information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Weak Algorithm"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-rsa-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-rsa-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2020-1810",
"datePublished": "2020-01-09T17:44:54",
"dateReserved": "2019-11-29T00:00:00",
"dateUpdated": "2024-08-04T06:46:30.887Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5304 (GCVE-0-2019-5304)
Vulnerability from cvelistv5 – Published: 2020-01-03 14:33 – Updated: 2024-08-04 19:54
VLAI?
Summary
Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.
Severity ?
No CVSS data available.
CWE
- Buffer Error
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;IPS Module;NGFW Module;NIP6300;NIP6600;NetEngine16EX;S5700;S6700;SRG1300;SRG2300;SRG3300;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600 |
Affected:
V200R006C10
Affected: V200R007C00 Affected: V200R008C20 Affected: V200R008C50 Affected: V200R003C01 Affected: V200R005C20 Affected: V500R001C20 Affected: V500R001C30 Affected: V500R002C00 Affected: V200R005C00 Affected: V200R005C02 Affected: V200R005C03 Affected: V200R006C00 Affected: V200R008C00 Affected: V200R010C00 Affected: V200R011C00 Affected: V200R005C01 Affected: V500R001C60 Affected: V500R005C00 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:54:53.290Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;IPS Module;NGFW Module;NIP6300;NIP6600;NetEngine16EX;S5700;S6700;SRG1300;SRG2300;SRG3300;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R007C00"
},
{
"status": "affected",
"version": "V200R008C20"
},
{
"status": "affected",
"version": "V200R008C50"
},
{
"status": "affected",
"version": "V200R003C01"
},
{
"status": "affected",
"version": "V200R005C20"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V200R005C00"
},
{
"status": "affected",
"version": "V200R005C02"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R006C00"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R010C00"
},
{
"status": "affected",
"version": "V200R011C00"
},
{
"status": "affected",
"version": "V200R005C01"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R005C00"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Buffer Error",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-01-03T14:33:41",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5304",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AR120-S;AR1200;AR1200-S;AR150;AR150-S;AR160;AR200;AR200-S;AR2200;AR2200-S;AR3200;AR3600;IPS Module;NGFW Module;NIP6300;NIP6600;NetEngine16EX;S5700;S6700;SRG1300;SRG2300;SRG3300;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600",
"version": {
"version_data": [
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R007C00"
},
{
"version_value": "V200R008C20"
},
{
"version_value": "V200R008C50"
},
{
"version_value": "V200R003C01"
},
{
"version_value": "V200R005C20"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V200R005C00"
},
{
"version_value": "V200R005C02"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R006C00"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R010C00"
},
{
"version_value": "V200R011C00"
},
{
"version_value": "V200R005C01"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R005C00"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Buffer Error"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-buffer-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5304",
"datePublished": "2020-01-03T14:33:41",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:54:53.290Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5254 (GCVE-0-2019-5254)
Vulnerability from cvelistv5 – Published: 2019-12-13 22:51 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.
Severity ?
No CVSS data available.
CWE
- out-of-bounds read
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.865Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "out-of-bounds read",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:51:29",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5254",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "out-of-bounds read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5254",
"datePublished": "2019-12-13T22:51:29",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.865Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5255 (GCVE-0-2019-5255)
Vulnerability from cvelistv5 – Published: 2019-12-13 22:48 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service.
Severity ?
No CVSS data available.
CWE
- DoS
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.961Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "DoS",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:48:31",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5255",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a DoS vulnerability. An attacker may send crafted messages from a FTP client to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the system out-of-bounds read and result in a denial of service condition of the affected service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "DoS"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5255",
"datePublished": "2019-12-13T22:48:31",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.961Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5256 (GCVE-0-2019-5256)
Vulnerability from cvelistv5 – Published: 2019-12-13 22:45 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot.
Severity ?
No CVSS data available.
CWE
- null pointer dereference
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.652Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "null pointer dereference",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:45:34",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5256",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a null pointer dereference vulnerability. The system dereferences a pointer that it expects to be valid, but is NULL. A local attacker could exploit this vulnerability by sending crafted parameters. A successful exploit could cause a denial of service and the process reboot."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "null pointer dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5256",
"datePublished": "2019-12-13T22:45:34",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.652Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5258 (GCVE-0-2019-5258)
Vulnerability from cvelistv5 – Published: 2019-12-13 22:41 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.
Severity ?
No CVSS data available.
CWE
- buffer overflow
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.829Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "buffer overflow",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:41:04",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5258",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "buffer overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5258",
"datePublished": "2019-12-13T22:41:04",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.829Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5257 (GCVE-0-2019-5257)
Vulnerability from cvelistv5 – Published: 2019-12-13 22:16 – Updated: 2024-08-04 19:47
VLAI?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network.
Severity ?
No CVSS data available.
CWE
- resource management
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Affected:
V200R005C30
Affected: V200R006C10 Affected: V200R006C20 Affected: V200R007C10 Affected: V200R007C20 Affected: V200R008C00 Affected: V200R008C10 Affected: V200R009C00 Affected: V500R001C00SPC300 Affected: V500R001C00SPC500 Affected: V500R001C00SPH303 Affected: V500R001C00SPH508 Affected: V500R001C20 Affected: V500R001C20SPC100 Affected: V500R001C20SPC100PWE Affected: V500R001C20SPC200 Affected: V500R001C20SPC200B062 Affected: V500R001C20SPC200PWE Affected: V500R001C20SPC300B078 Affected: V500R001C20SPC300PWE Affected: V500R001C30 Affected: V500R001C30SPC100 Affected: V500R001C30SPC100PWE Affected: V500R001C30SPC200 Affected: V500R001C30SPC200PWE Affected: V500R001C30SPC300 Affected: V500R001C50 Affected: V500R001C50PWE Affected: V500R001C80 Affected: V500R005C00 Affected: V500R001C00SPC500PWE Affected: V500R002C00 Affected: V500R002C00SPC100 Affected: V500R002C00SPC100PWE Affected: V500R002C00SPC200 Affected: V500R002C00SPC200PWE Affected: V500R002C00SPC300 Affected: V500R002C10 Affected: V500R002C10PWE Affected: V500R002C30 Affected: V500R002C30PWE Affected: V200R005C03 Affected: V200R003C00SPC100 Affected: V500R002C20 Affected: V500R001C00 Affected: V500R001C00SPC200 Affected: V500R001C00SPC600 Affected: V500R001C00SPC700 Affected: V500R001C20SPC300 Affected: V500R001C20SPC500 Affected: V500R001C20SPC600 Affected: V500R001C60SPC100 Affected: V500R001C60SPC101 Affected: V500R001C60SPC200 Affected: V500R001C60SPC300 Affected: V500R001C60SPC500 Affected: V500R001C60SPC600 Affected: V500R005C00SPC100 Affected: V100R001C20SPC100 Affected: V500R001C20SPC101 Affected: V500R001C80PWE Affected: V100R001C00SPC200 Affected: V100R001C10SPC200 Affected: V100R001C10SPC201 Affected: V100R001C20SPC200 Affected: V500R001C00SPC050 Affected: V500R001C00SPC090 Affected: V500R001C30SPC500 Affected: V500R001C30SPC600 Affected: V500R001C30SPC600PWE Affected: V500R001C30SPC601 Affected: V500R001C50SPC009 Affected: V500R001C50SPC100 Affected: V500R001C50SPC100PWE Affected: V500R001C50SPC200 Affected: V500R001C50SPC200PWE Affected: V500R001C50SPC300 Affected: V500R001C60 Affected: V500R001C60SPC100PWE Affected: V500R001C60SPC200PWE Affected: V500R005C00SPC102 Affected: V500R001C10 Affected: V500R001C10SPC100 Affected: V500R001C10SPC200 Affected: V500R003C00 Affected: V500R003C00SPC100 Affected: V200R003C50SPC700 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.752Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "V200R005C30"
},
{
"status": "affected",
"version": "V200R006C10"
},
{
"status": "affected",
"version": "V200R006C20"
},
{
"status": "affected",
"version": "V200R007C10"
},
{
"status": "affected",
"version": "V200R007C20"
},
{
"status": "affected",
"version": "V200R008C00"
},
{
"status": "affected",
"version": "V200R008C10"
},
{
"status": "affected",
"version": "V200R009C00"
},
{
"status": "affected",
"version": "V500R001C00SPC300"
},
{
"status": "affected",
"version": "V500R001C00SPC500"
},
{
"status": "affected",
"version": "V500R001C00SPH303"
},
{
"status": "affected",
"version": "V500R001C00SPH508"
},
{
"status": "affected",
"version": "V500R001C20"
},
{
"status": "affected",
"version": "V500R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C20SPC200B062"
},
{
"status": "affected",
"version": "V500R001C20SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C20SPC300B078"
},
{
"status": "affected",
"version": "V500R001C20SPC300PWE"
},
{
"status": "affected",
"version": "V500R001C30"
},
{
"status": "affected",
"version": "V500R001C30SPC100"
},
{
"status": "affected",
"version": "V500R001C30SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC200"
},
{
"status": "affected",
"version": "V500R001C30SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC300"
},
{
"status": "affected",
"version": "V500R001C50"
},
{
"status": "affected",
"version": "V500R001C50PWE"
},
{
"status": "affected",
"version": "V500R001C80"
},
{
"status": "affected",
"version": "V500R005C00"
},
{
"status": "affected",
"version": "V500R001C00SPC500PWE"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "V500R002C00SPC100"
},
{
"status": "affected",
"version": "V500R002C00SPC100PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC200"
},
{
"status": "affected",
"version": "V500R002C00SPC200PWE"
},
{
"status": "affected",
"version": "V500R002C00SPC300"
},
{
"status": "affected",
"version": "V500R002C10"
},
{
"status": "affected",
"version": "V500R002C10PWE"
},
{
"status": "affected",
"version": "V500R002C30"
},
{
"status": "affected",
"version": "V500R002C30PWE"
},
{
"status": "affected",
"version": "V200R005C03"
},
{
"status": "affected",
"version": "V200R003C00SPC100"
},
{
"status": "affected",
"version": "V500R002C20"
},
{
"status": "affected",
"version": "V500R001C00"
},
{
"status": "affected",
"version": "V500R001C00SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC600"
},
{
"status": "affected",
"version": "V500R001C00SPC700"
},
{
"status": "affected",
"version": "V500R001C20SPC300"
},
{
"status": "affected",
"version": "V500R001C20SPC500"
},
{
"status": "affected",
"version": "V500R001C20SPC600"
},
{
"status": "affected",
"version": "V500R001C60SPC100"
},
{
"status": "affected",
"version": "V500R001C60SPC101"
},
{
"status": "affected",
"version": "V500R001C60SPC200"
},
{
"status": "affected",
"version": "V500R001C60SPC300"
},
{
"status": "affected",
"version": "V500R001C60SPC500"
},
{
"status": "affected",
"version": "V500R001C60SPC600"
},
{
"status": "affected",
"version": "V500R005C00SPC100"
},
{
"status": "affected",
"version": "V100R001C20SPC100"
},
{
"status": "affected",
"version": "V500R001C20SPC101"
},
{
"status": "affected",
"version": "V500R001C80PWE"
},
{
"status": "affected",
"version": "V100R001C00SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC200"
},
{
"status": "affected",
"version": "V100R001C10SPC201"
},
{
"status": "affected",
"version": "V100R001C20SPC200"
},
{
"status": "affected",
"version": "V500R001C00SPC050"
},
{
"status": "affected",
"version": "V500R001C00SPC090"
},
{
"status": "affected",
"version": "V500R001C30SPC500"
},
{
"status": "affected",
"version": "V500R001C30SPC600"
},
{
"status": "affected",
"version": "V500R001C30SPC600PWE"
},
{
"status": "affected",
"version": "V500R001C30SPC601"
},
{
"status": "affected",
"version": "V500R001C50SPC009"
},
{
"status": "affected",
"version": "V500R001C50SPC100"
},
{
"status": "affected",
"version": "V500R001C50SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC200"
},
{
"status": "affected",
"version": "V500R001C50SPC200PWE"
},
{
"status": "affected",
"version": "V500R001C50SPC300"
},
{
"status": "affected",
"version": "V500R001C60"
},
{
"status": "affected",
"version": "V500R001C60SPC100PWE"
},
{
"status": "affected",
"version": "V500R001C60SPC200PWE"
},
{
"status": "affected",
"version": "V500R005C00SPC102"
},
{
"status": "affected",
"version": "V500R001C10"
},
{
"status": "affected",
"version": "V500R001C10SPC100"
},
{
"status": "affected",
"version": "V500R001C10SPC200"
},
{
"status": "affected",
"version": "V500R003C00"
},
{
"status": "affected",
"version": "V500R003C00SPC100"
},
{
"status": "affected",
"version": "V200R003C50SPC700"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "resource management",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-13T22:16:22",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5257",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981",
"version": {
"version_data": [
{
"version_value": "V200R005C30"
},
{
"version_value": "V200R006C10"
},
{
"version_value": "V200R006C20"
},
{
"version_value": "V200R007C10"
},
{
"version_value": "V200R007C20"
},
{
"version_value": "V200R008C00"
},
{
"version_value": "V200R008C10"
},
{
"version_value": "V200R009C00"
},
{
"version_value": "V500R001C00SPC300"
},
{
"version_value": "V500R001C00SPC500"
},
{
"version_value": "V500R001C00SPH303"
},
{
"version_value": "V500R001C00SPH508"
},
{
"version_value": "V500R001C20"
},
{
"version_value": "V500R001C20SPC100"
},
{
"version_value": "V500R001C20SPC100PWE"
},
{
"version_value": "V500R001C20SPC200"
},
{
"version_value": "V500R001C20SPC200B062"
},
{
"version_value": "V500R001C20SPC200PWE"
},
{
"version_value": "V500R001C20SPC300B078"
},
{
"version_value": "V500R001C20SPC300PWE"
},
{
"version_value": "V500R001C30"
},
{
"version_value": "V500R001C30SPC100"
},
{
"version_value": "V500R001C30SPC100PWE"
},
{
"version_value": "V500R001C30SPC200"
},
{
"version_value": "V500R001C30SPC200PWE"
},
{
"version_value": "V500R001C30SPC300"
},
{
"version_value": "V500R001C50"
},
{
"version_value": "V500R001C50PWE"
},
{
"version_value": "V500R001C80"
},
{
"version_value": "V500R005C00"
},
{
"version_value": "V500R001C00SPC500PWE"
},
{
"version_value": "V500R002C00"
},
{
"version_value": "V500R002C00SPC100"
},
{
"version_value": "V500R002C00SPC100PWE"
},
{
"version_value": "V500R002C00SPC200"
},
{
"version_value": "V500R002C00SPC200PWE"
},
{
"version_value": "V500R002C00SPC300"
},
{
"version_value": "V500R002C10"
},
{
"version_value": "V500R002C10PWE"
},
{
"version_value": "V500R002C30"
},
{
"version_value": "V500R002C30PWE"
},
{
"version_value": "V200R005C03"
},
{
"version_value": "V200R003C00SPC100"
},
{
"version_value": "V500R002C20"
},
{
"version_value": "V500R001C00"
},
{
"version_value": "V500R001C00SPC200"
},
{
"version_value": "V500R001C00SPC600"
},
{
"version_value": "V500R001C00SPC700"
},
{
"version_value": "V500R001C20SPC300"
},
{
"version_value": "V500R001C20SPC500"
},
{
"version_value": "V500R001C20SPC600"
},
{
"version_value": "V500R001C60SPC100"
},
{
"version_value": "V500R001C60SPC101"
},
{
"version_value": "V500R001C60SPC200"
},
{
"version_value": "V500R001C60SPC300"
},
{
"version_value": "V500R001C60SPC500"
},
{
"version_value": "V500R001C60SPC600"
},
{
"version_value": "V500R005C00SPC100"
},
{
"version_value": "V100R001C20SPC100"
},
{
"version_value": "V500R001C20SPC101"
},
{
"version_value": "V500R001C80PWE"
},
{
"version_value": "V100R001C00SPC200"
},
{
"version_value": "V100R001C10SPC200"
},
{
"version_value": "V100R001C10SPC201"
},
{
"version_value": "V100R001C20SPC200"
},
{
"version_value": "V500R001C00SPC050"
},
{
"version_value": "V500R001C00SPC090"
},
{
"version_value": "V500R001C30SPC500"
},
{
"version_value": "V500R001C30SPC600"
},
{
"version_value": "V500R001C30SPC600PWE"
},
{
"version_value": "V500R001C30SPC601"
},
{
"version_value": "V500R001C50SPC009"
},
{
"version_value": "V500R001C50SPC100"
},
{
"version_value": "V500R001C50SPC100PWE"
},
{
"version_value": "V500R001C50SPC200"
},
{
"version_value": "V500R001C50SPC200PWE"
},
{
"version_value": "V500R001C50SPC300"
},
{
"version_value": "V500R001C60"
},
{
"version_value": "V500R001C60SPC100PWE"
},
{
"version_value": "V500R001C60SPC200PWE"
},
{
"version_value": "V500R005C00SPC102"
},
{
"version_value": "V500R001C10"
},
{
"version_value": "V500R001C10SPC100"
},
{
"version_value": "V500R001C10SPC200"
},
{
"version_value": "V500R003C00"
},
{
"version_value": "V500R003C00SPC100"
},
{
"version_value": "V200R003C50SPC700"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace) have a resource management vulnerability. An attacker who logs in to the board may send crafted messages from the internal network."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "resource management"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5257",
"datePublished": "2019-12-13T22:16:22",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.752Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}