Search criteria
24 vulnerabilities found for s9300 by huawei
VAR-201704-0422
Vulnerability from variot - Updated: 2025-04-20 23:38Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion. The Huawei AR3200 is a Huawei router. The S9700, S5300, S5700, S6300, S6700, S7700, S9300, and S9700 are Huawei switch devices. A number of Huawei products have a memory leak vulnerability. The Multi-Protocol Labeling (MPLS) packet processing module of the device repeatedly requests the memory when processing abnormal packets. There is a risk that the continuous attack will cause the memory to run out. An attacker could exploit this vulnerability to cause the device to run out of memory. The Huawei AR3200 and others are all products of China's Huawei (Huawei). The following products are affected: Huawei AR3200 V200R007C00 Version, V200R005C32 Version, V200R005C20 Version; S12700 V200R008C00 Version, V200R007C00 Version; S5300 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S5700 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S6300 V200R008C00 Version, V200R007C00 Version; S6700 V200R008C00 version, V200R007C00 version; S7700 V200R008C00 version, V200R007C00 version, V200R006C00 version; S9300 V200R008C00 version, V2007C00 version, V200R006C00 version;
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201704-0422",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c32"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c20"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "ar3200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar3200 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar3200 v200r005c32",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar3200 v200r005c20",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:ar3200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
}
]
},
"cve": "CVE-2016-8797",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-8797",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-11302",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-97617",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2016-8797",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-8797",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2016-8797",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2016-11302",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201704-187",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-97617",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2016-8797",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "VULHUB",
"id": "VHN-97617"
},
{
"db": "VULMON",
"id": "CVE-2016-8797"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion. The Huawei AR3200 is a Huawei router. The S9700, S5300, S5700, S6300, S6700, S7700, S9300, and S9700 are Huawei switch devices. A number of Huawei products have a memory leak vulnerability. The Multi-Protocol Labeling (MPLS) packet processing module of the device repeatedly requests the memory when processing abnormal packets. There is a risk that the continuous attack will cause the memory to run out. An attacker could exploit this vulnerability to cause the device to run out of memory. The Huawei AR3200 and others are all products of China\u0027s Huawei (Huawei). The following products are affected: Huawei AR3200 V200R007C00 Version, V200R005C32 Version, V200R005C20 Version; S12700 V200R008C00 Version, V200R007C00 Version; S5300 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S5700 V200R008C00 Version, V200R007C00 Version, V200R006C00 Version; S6300 V200R008C00 Version, V200R007C00 Version; S6700 V200R008C00 version, V200R007C00 version; S7700 V200R008C00 version, V200R007C00 version, V200R006C00 version; S9300 V200R008C00 version, V2007C00 version, V200R006C00 version;",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8797"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "VULHUB",
"id": "VHN-97617"
},
{
"db": "VULMON",
"id": "CVE-2016-8797"
}
],
"trust": 2.34
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-8797",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-11302",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-97617",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2016-8797",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "VULHUB",
"id": "VHN-97617"
},
{
"db": "VULMON",
"id": "CVE-2016-8797"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"id": "VAR-201704-0422",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "VULHUB",
"id": "VHN-97617"
}
],
"trust": 1.4974079033333334
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
}
]
},
"last_update_date": "2025-04-20T23:38:32.435000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160608-01-mpls",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en"
},
{
"title": "Patches for memory leaks in various Huawei products",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/84093"
},
{
"title": "Various Huawei product memory leak vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=69035"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-97617"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8797"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-8797"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/399.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "VULHUB",
"id": "VHN-97617"
},
{
"db": "VULMON",
"id": "CVE-2016-8797"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"db": "VULHUB",
"id": "VHN-97617"
},
{
"db": "VULMON",
"id": "CVE-2016-8797"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-11-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"date": "2017-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-97617"
},
{
"date": "2017-04-02T00:00:00",
"db": "VULMON",
"id": "CVE-2016-8797"
},
{
"date": "2017-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"date": "2017-04-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"date": "2017-04-02T20:59:01.860000",
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-11-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11302"
},
{
"date": "2017-04-11T00:00:00",
"db": "VULHUB",
"id": "VHN-97617"
},
{
"date": "2017-04-11T00:00:00",
"db": "VULMON",
"id": "CVE-2016-8797"
},
{
"date": "2017-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008269"
},
{
"date": "2017-04-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-187"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2016-8797"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Vulnerability that can consume memory in product software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008269"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-187"
}
],
"trust": 0.6
}
}
VAR-201704-0464
Vulnerability from variot - Updated: 2025-04-20 23:38Huawei S9300, S9303, S9306, S9312 with software V100R002; S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005; S9300E, S9303E, S9306E, S9312E with software V200R001; S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005; S12708, S12712 with software V200R005; 5700HI, 5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005; 5710EI, 5310EI with software V200R002, V200R003, V200R005; 5710HI, 5310HI with software V200R003, V200R005; 6700EI, 6300EI with software V200R005 could cause a leak of IP addresses of devices, related to unintended interface support for VRP MPLS LSP Ping. Huawei S9300 and other Huawei S series switches are Huawei. An information disclosure vulnerability exists in several Huawei switches that use the VRP platform. The Huawei S9300 and others are all S-series switches of China's Huawei (Huawei). The following products and versions are affected: Huawei S300 V100R002 version, V100R003 version, V100R006 version, V200R001 version, V200R002 version, V200R003 version; S9303 V100R002 version, V100R003 version, V200R001 version, V200R003 version; V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S9312 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7700 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7703 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7706 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7712 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S9300E V200R001 Version, V200R002 Version, V200R003 Version, V200R005 Version; S9303E V200R001 Version, V200R002 Version, V200R003 Version, V200R005 Version; S9306E V200R001 Version, V200R002 Version, V200R003 Version, V200R005 Version; S9312E
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201704-0464",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "5700hi",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "5700hi",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "5700hi",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "5300hi",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "5300hi",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "5300hi",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "5300hi",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "5300hi",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "5710ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "5710ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "5310ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s7706",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s7703",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "5310ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s9703",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s7703",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s7712",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s7712",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9703",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9712",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9703",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s9712",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9712",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s7703",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9303e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9303",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s7703",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9703",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9303",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9312",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s9303e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s9303",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9303e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s9303",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "6700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "5710ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s7706",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s7706",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9303",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s7706",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9303",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9312e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s7706",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s7712",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s7712",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9306",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s7712",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s7712",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s7703",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s7703",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9312",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s7712",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9312",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9312",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9306e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "5310ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s7703",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s9312",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9312e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9306e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "5310hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s9306e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "5310hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s9312",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9312e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9312e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s9706",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9312",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9712",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9706",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "6300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s9306",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9306",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9306e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9706",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s12712",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s9303",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s9306",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9306",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s9303e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9706",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9306",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s12708",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "s7706",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s7706",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9306",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7703",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7706",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7712",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9303",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9303e",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9306",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9306e",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9312",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9312e",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9703",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9706",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9712",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v100r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v100r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300/ s9303/ s9306/ s9312/ s7700/ s7703/ s7706/ s7712 v200r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e/ s9303e/ s9306e/ s9312e/ s9700/ s9703/ s9706/ s9712 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e/ s9303e/ s9306e/ s9312e/ s9700/ s9703/ s9706/ s9712 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e/ s9303e/ s9306e/ s9312e/ s9700/ s9703/ s9706/ s9712 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e/ s9303e/ s9306e/ s9312e/ s9700/ s9703/ s9706/ s9712 v200r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12708/ s12712 v200r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "5700hi/5300hi v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "5700hi/5300hi v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "5700hi/5300hi v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "5700hi/5300hi v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "5700hi/5300hi v200r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "5710ei/5310ei v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "5710ei/5310ei v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "5710ei/5310ei v200r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "5710hi/5310hi v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "5710hi/5310hi v200r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "6700ei/6300ei v200r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-04631"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008288"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-210"
},
{
"db": "NVD",
"id": "CVE-2014-8570"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7703_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7706_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7712_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300e_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9303_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9303e_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9306_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9306e_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9312_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9312e_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9703_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9706_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9712_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008288"
}
]
},
"cve": "CVE-2014-8570",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2014-8570",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-04631",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-76515",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"id": "CVE-2014-8570",
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-8570",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2014-8570",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2017-04631",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201704-210",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-76515",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-04631"
},
{
"db": "VULHUB",
"id": "VHN-76515"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008288"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-210"
},
{
"db": "NVD",
"id": "CVE-2014-8570"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei S9300, S9303, S9306, S9312 with software V100R002; S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005; S9300E, S9303E, S9306E, S9312E with software V200R001; S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005; S12708, S12712 with software V200R005; 5700HI, 5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005; 5710EI, 5310EI with software V200R002, V200R003, V200R005; 5710HI, 5310HI with software V200R003, V200R005; 6700EI, 6300EI with software V200R005 could cause a leak of IP addresses of devices, related to unintended interface support for VRP MPLS LSP Ping. Huawei S9300 and other Huawei S series switches are Huawei. An information disclosure vulnerability exists in several Huawei switches that use the VRP platform. The Huawei S9300 and others are all S-series switches of China\u0027s Huawei (Huawei). The following products and versions are affected: Huawei S300 V100R002 version, V100R003 version, V100R006 version, V200R001 version, V200R002 version, V200R003 version; S9303 V100R002 version, V100R003 version, V200R001 version, V200R003 version; V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S9312 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7700 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7703 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7706 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S7712 V100R002 Version, V100R003 Version, V100R006 Version, V200R001 Version, V200R002 Version, V200R003 Version; S9300E V200R001 Version, V200R002 Version, V200R003 Version, V200R005 Version; S9303E V200R001 Version, V200R002 Version, V200R003 Version, V200R005 Version; S9306E V200R001 Version, V200R002 Version, V200R003 Version, V200R005 Version; S9312E",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-8570"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008288"
},
{
"db": "CNVD",
"id": "CNVD-2017-04631"
},
{
"db": "VULHUB",
"id": "VHN-76515"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-8570",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008288",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201704-210",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-04631",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-76515",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-04631"
},
{
"db": "VULHUB",
"id": "VHN-76515"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008288"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-210"
},
{
"db": "NVD",
"id": "CVE-2014-8570"
}
]
},
"id": "VAR-201704-0464",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-04631"
},
{
"db": "VULHUB",
"id": "VHN-76515"
}
],
"trust": 1.5370585183333332
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-04631"
}
]
},
"last_update_date": "2025-04-20T23:38:32.403000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20140924-01-VRP",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-372145"
},
{
"title": "Patches for various Huawei switch information disclosure vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/91943"
},
{
"title": "Various Huawei switch information disclosure vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=69056"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-04631"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008288"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-210"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-76515"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008288"
},
{
"db": "NVD",
"id": "CVE-2014-8570"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-372145"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8570"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-8570"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-04631"
},
{
"db": "VULHUB",
"id": "VHN-76515"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008288"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-210"
},
{
"db": "NVD",
"id": "CVE-2014-8570"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-04631"
},
{
"db": "VULHUB",
"id": "VHN-76515"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008288"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-210"
},
{
"db": "NVD",
"id": "CVE-2014-8570"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-04631"
},
{
"date": "2017-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-76515"
},
{
"date": "2017-05-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008288"
},
{
"date": "2017-04-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-210"
},
{
"date": "2017-04-02T20:59:00.343000",
"db": "NVD",
"id": "CVE-2014-8570"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-04631"
},
{
"date": "2017-04-10T00:00:00",
"db": "VULHUB",
"id": "VHN-76515"
},
{
"date": "2017-05-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008288"
},
{
"date": "2017-04-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-210"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2014-8570"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-210"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Device in the product software IP Vulnerability that could lead to address disclosure",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008288"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-210"
}
],
"trust": 0.6
}
}
VAR-201706-0237
Vulnerability from variot - Updated: 2025-04-20 23:36The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message. HuaweiS2300 is a switch device of Huawei (Huawei). IPstack is one of the transport protocols. IPstack in several Huawei products has a security vulnerability. The vulnerability stems from the failure of the packet processing module to correctly determine the length of the IP option. An attacker can use this vulnerability to create a board reset by using a special ICMP packet. The following versions are affected: Huawei S2300/S2700/S3300/S3700 V100R00600 Version, V100R006C03 Version, V100R006C05 Version; S5300EI/S5700EI/S5300SI/S5700SI V100R006C00 Version, V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300HI/S5700HI S6300EI/S6700EI /S5710HI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300LI/S5700LI/S2350EI/S2750EI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version, V200R006C00SPC500 Version, V200R007C00SPC500 Version; S5720HI V200R006C00SPC500 Version, V200R007C00SPC500 Version; S7700/S9300/ S9700 V200R001C00SPC300, V200R002C00SPC300, V200R003C00SPC500, V200R005C00SPC300, V200R006C00SPC500, V200R007C00SPC500; S12700
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201706-0237",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s6300ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5720hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s6700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s6700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5720hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2750ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700si",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5710hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi v200r006c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi v200r007c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2350ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2750ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300si_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700si_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5710hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5720hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
}
]
},
"cve": "CVE-2015-3913",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2015-3913",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-33208",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-81874",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2015-3913",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-3913",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-3913",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2017-33208",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201706-290",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-81874",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message. HuaweiS2300 is a switch device of Huawei (Huawei). IPstack is one of the transport protocols. IPstack in several Huawei products has a security vulnerability. The vulnerability stems from the failure of the packet processing module to correctly determine the length of the IP option. An attacker can use this vulnerability to create a board reset by using a special ICMP packet. The following versions are affected: Huawei S2300/S2700/S3300/S3700 V100R00600 Version, V100R006C03 Version, V100R006C05 Version; S5300EI/S5700EI/S5300SI/S5700SI V100R006C00 Version, V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300HI/S5700HI S6300EI/S6700EI /S5710HI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300LI/S5700LI/S2350EI/S2750EI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version, V200R006C00SPC500 Version, V200R007C00SPC500 Version; S5720HI V200R006C00SPC500 Version, V200R007C00SPC500 Version; S7700/S9300/ S9700 V200R001C00SPC300, V200R002C00SPC300, V200R003C00SPC500, V200R005C00SPC300, V200R006C00SPC500, V200R007C00SPC500; S12700",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-3913"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-3913",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-33208",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-81874",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"id": "VAR-201706-0237",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
}
],
"trust": 1.48522971
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
}
]
},
"last_update_date": "2025-04-20T23:36:54.009000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20150506-01-ICMP",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-427449"
},
{
"title": "Patches for various Huawei product input verification vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/105678"
},
{
"title": "Multiple Huawei Fixes for product input validation vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74793"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3913"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-3913"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-427449"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"date": "2017-06-08T00:00:00",
"db": "VULHUB",
"id": "VHN-81874"
},
{
"date": "2017-07-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"date": "2017-06-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"date": "2017-06-08T21:29:00.377000",
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"date": "2017-06-22T00:00:00",
"db": "VULHUB",
"id": "VHN-81874"
},
{
"date": "2017-07-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"date": "2017-09-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Campus Series switch model IP Service operation disruption in the stack (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
}
],
"trust": 0.6
}
}
VAR-201704-0463
Vulnerability from variot - Updated: 2025-04-20 23:32Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service. plural Huawei Product software includes VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There are vulnerabilities that are put into a state.By a remote attacker, VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There is a possibility of being put into a state. HuaweiAC6605 is a wireless access controller product from China's Huawei company. A security vulnerability exists in the SSH module of several Huawei products. The vulnerability is caused by the lack of valid verification of a domain in the message content when the program processes the message. This vulnerability could be exploited by an attacker to cause a device service interruption using the VRP platform. The following products and versions are affected: Huawei AC6605 V200R001C00 Version, AC6605 V200R002C00 Version, ACU V200R001C00 Version, V200R002C00 Version, S2300/ S3300/S2700/ S3700 V100R006C05 and previous versions, S5300/ S5700/S6300/ S6700 V100R006 Version, V200R001 Version, V200R002 Version, V200R003, V200R005C00SPC300 and earlier versions, S7700/S9300/S9300E/S9700 V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201704-0463",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s5300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "acu",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "acu_v200r001c00"
},
{
"model": "ac6605",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "ac6605_v200r002c00"
},
{
"model": "s7700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s series",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s6300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9300e",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "acu",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "acu_v200r002c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s6700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s9300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "ac6605",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "ac6605_v200r001c00"
},
{
"model": "s5700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "ac6605",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "acu",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ac6605 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ac6605 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "acu v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "acu v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 \u003c=v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 \u003c=v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 \u003c=v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3700 \u003c=v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 \u003c=v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r005c00spc300"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
},
{
"db": "NVD",
"id": "CVE-2014-8572"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:ac6605_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:acu_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300e_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
],
"trust": 0.6
},
"cve": "CVE-2014-8572",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2014-8572",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-03649",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-76517",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2014-8572",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-8572",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2014-8572",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2016-03649",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201605-577",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-76517",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "VULHUB",
"id": "VHN-76517"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
},
{
"db": "NVD",
"id": "CVE-2014-8572"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service. plural Huawei Product software includes VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There are vulnerabilities that are put into a state.By a remote attacker, VRP Special to device SSH Packets are sent and service operation is interrupted (DoS) There is a possibility of being put into a state. HuaweiAC6605 is a wireless access controller product from China\u0027s Huawei company. A security vulnerability exists in the SSH module of several Huawei products. The vulnerability is caused by the lack of valid verification of a domain in the message content when the program processes the message. This vulnerability could be exploited by an attacker to cause a device service interruption using the VRP platform. The following products and versions are affected: Huawei AC6605 V200R001C00 Version, AC6605 V200R002C00 Version, ACU V200R001C00 Version, V200R002C00 Version, S2300/ S3300/S2700/ S3700 V100R006C05 and previous versions, S5300/ S5700/S6300/ S6700 V100R006 Version, V200R001 Version, V200R002 Version, V200R003, V200R005C00SPC300 and earlier versions, S7700/S9300/S9300E/S9700 V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-8572"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "VULHUB",
"id": "VHN-76517"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-8572",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-03649",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-76517",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "VULHUB",
"id": "VHN-76517"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
},
{
"db": "NVD",
"id": "CVE-2014-8572"
}
]
},
"id": "VAR-201704-0463",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "VULHUB",
"id": "VHN-76517"
}
],
"trust": 1.257416919512195
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
}
]
},
"last_update_date": "2025-04-20T23:32:14.430000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20141010-01-VRP",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182"
},
{
"title": "Patches for various Huawei Product Denial of Service Vulnerabilities (CNVD-2016-03649)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/76517"
},
{
"title": "Multiple Huawei Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61890"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-76517"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "NVD",
"id": "CVE-2014-8572"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182"
},
{
"trust": 1.2,
"url": "http://www.huawei.com/cn/psirt/security-advisories/hw-373183"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8572"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-8572"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "VULHUB",
"id": "VHN-76517"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
},
{
"db": "NVD",
"id": "CVE-2014-8572"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"db": "VULHUB",
"id": "VHN-76517"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
},
{
"db": "NVD",
"id": "CVE-2014-8572"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-05-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"date": "2017-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-76517"
},
{
"date": "2017-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"date": "2016-05-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201605-577"
},
{
"date": "2017-04-02T20:59:00.423000",
"db": "NVD",
"id": "CVE-2014-8572"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-05-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-03649"
},
{
"date": "2017-04-11T00:00:00",
"db": "VULHUB",
"id": "VHN-76517"
},
{
"date": "2017-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008290"
},
{
"date": "2016-05-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201605-577"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2014-8572"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Service disruption in product software (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008290"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201605-577"
}
],
"trust": 0.6
}
}
VAR-201704-0437
Vulnerability from variot - Updated: 2025-04-20 23:26Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches. plural Huawei The product contains a data processing vulnerability.Denial of service (DoS) An attack could be made. The S9300, S2300, S3300, S5300, and S6300 are various types of switches introduced by Huawei. An attacker could exploit this vulnerability to reboot the device. The following products and versions are affected: Huawei S9300 V100R006C00SPC500 Version, V100R006C00SPC800 Version; S2300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S3300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S5300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S6300 V100R006C00SPC800 Version, V100R006C01SPC100 The version is V100R006C03
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201704-0437",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s3300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00spc800"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00spc800"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c01spc100"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00spc800"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c01spc100"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00spc500"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c01spc100"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00spc800"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c01spc100"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00spc800"
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c00spc800",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c01spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r006c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r006c00spc800",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r006c00spc800",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r006c01spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 v100r006c00spc800",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 v100r006c01spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v100r006c00spc800",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v100r006c01spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
},
{
"db": "NVD",
"id": "CVE-2014-3223"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:s2300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
}
]
},
"cve": "CVE-2014-3223",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2014-3223",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-05108",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-71162",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2014-3223",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-3223",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2014-3223",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2017-05108",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201704-213",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-71162",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "VULHUB",
"id": "VHN-71162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
},
{
"db": "NVD",
"id": "CVE-2014-3223"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei S9300 with software before V100R006SPH013 and S2300,S3300,S5300,S6300 with software before V100R006SPH010 support Y.1731 and therefore have the Y.1731 vulnerability in processing special packets. The vulnerability causes the restart of switches. plural Huawei The product contains a data processing vulnerability.Denial of service (DoS) An attack could be made. The S9300, S2300, S3300, S5300, and S6300 are various types of switches introduced by Huawei. An attacker could exploit this vulnerability to reboot the device. The following products and versions are affected: Huawei S9300 V100R006C00SPC500 Version, V100R006C00SPC800 Version; S2300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S3300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S5300 V100R006C00SPC800 Version, V100R006C01SPC100 Version, V100R006C03 Version; S6300 V100R006C00SPC800 Version, V100R006C01SPC100 The version is V100R006C03",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-3223"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "VULHUB",
"id": "VHN-71162"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-3223",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-05108",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-71162",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "VULHUB",
"id": "VHN-71162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
},
{
"db": "NVD",
"id": "CVE-2014-3223"
}
]
},
"id": "VAR-201704-0437",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "VULHUB",
"id": "VHN-71162"
}
],
"trust": 1.5761652277777778
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
}
]
},
"last_update_date": "2025-04-20T23:26:07.621000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20140317-01",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-329625"
},
{
"title": "Huawei switch Y.1731 denial of service vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/92443"
},
{
"title": "Repair measures for various Huawei switch security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=69059"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-19",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "NVD",
"id": "CVE-2014-3223"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-329625"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3223"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-3223"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "VULHUB",
"id": "VHN-71162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
},
{
"db": "NVD",
"id": "CVE-2014-3223"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"db": "VULHUB",
"id": "VHN-71162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
},
{
"db": "NVD",
"id": "CVE-2014-3223"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"date": "2017-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-71162"
},
{
"date": "2017-05-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"date": "2017-04-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-213"
},
{
"date": "2017-04-02T20:59:00.237000",
"db": "NVD",
"id": "CVE-2014-3223"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05108"
},
{
"date": "2017-04-05T00:00:00",
"db": "VULHUB",
"id": "VHN-71162"
},
{
"date": "2017-05-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008274"
},
{
"date": "2017-04-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-213"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2014-3223"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Data processing vulnerabilities in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008274"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-213"
}
],
"trust": 0.6
}
}
VAR-201704-0502
Vulnerability from variot - Updated: 2025-04-20 23:26Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets. Multiple Huawei Product has a service disruption (DoS) There are vulnerabilities that are put into a state.An attacker could create a malformed MPLS Service interruption due to packet transmission (DoS) There is a possibility of being put into a state. Huawei S9700 is the S series switch of China Huawei. A denial of service vulnerability exists in several Huawei products due to the failure of the program to properly verify MultiprotocolLabelSwitching (MPLS) messages. Multiple Huawei products are prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the affected device, denying service to legitimate users. The following products and versions are affected: Huawei S9700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S9300 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S7700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S6700 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C01 , V200R001C00 ; Huawei S6300 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 ; Huawei S5700 V200R009C00 , V200R008C00 , V200R007C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C00 ; Huawei S5300 V200R009C00 , V200R008C00 , V200R007C00 , V200R003C00 ; Huawei S12700 V200R009C00 , V200R008C00 , V200R007C01 , V200R007C00
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201704-0502",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 1.5,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008c00",
"scope": null,
"trust": 1.5,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c03"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c01"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s7700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r007c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r007c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r007c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r007c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r009c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r009c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r009c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "BID",
"id": "94285"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
},
{
"db": "NVD",
"id": "CVE-2016-8773"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "94285"
}
],
"trust": 0.3
},
"cve": "CVE-2016-8773",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-8773",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-11388",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-97593",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2016-8773",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-8773",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2016-8773",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2016-11388",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201611-370",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-97593",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "VULHUB",
"id": "VHN-97593"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
},
{
"db": "NVD",
"id": "CVE-2016-8773"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets. Multiple Huawei Product has a service disruption (DoS) There are vulnerabilities that are put into a state.An attacker could create a malformed MPLS Service interruption due to packet transmission (DoS) There is a possibility of being put into a state. Huawei S9700 is the S series switch of China Huawei. A denial of service vulnerability exists in several Huawei products due to the failure of the program to properly verify MultiprotocolLabelSwitching (MPLS) messages. Multiple Huawei products are prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to crash the affected device, denying service to legitimate users. The following products and versions are affected: Huawei S9700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S9300 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S7700 V200R009C00 , V200R008C00 , V200R007C00 ; Huawei S6700 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C01 , V200R001C00 ; Huawei S6300 V200R009C00 , V200R008C00 , V200R005C00 , V200R003C00 ; Huawei S5700 V200R009C00 , V200R008C00 , V200R007C00 , V200R005C00 , V200R003C00 , V200R002C00 , V200R001C00 ; Huawei S5300 V200R009C00 , V200R008C00 , V200R007C00 , V200R003C00 ; Huawei S12700 V200R009C00 , V200R008C00 , V200R007C01 , V200R007C00 ",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8773"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "BID",
"id": "94285"
},
{
"db": "VULHUB",
"id": "VHN-97593"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-8773",
"trust": 3.4
},
{
"db": "BID",
"id": "94285",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-11388",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-97593",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "VULHUB",
"id": "VHN-97593"
},
{
"db": "BID",
"id": "94285"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
},
{
"db": "NVD",
"id": "CVE-2016-8773"
}
]
},
"id": "VAR-201704-0502",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "VULHUB",
"id": "VHN-97593"
}
],
"trust": 1.5258122851428568
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
}
]
},
"last_update_date": "2025-04-20T23:26:07.556000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20161111-01-mpls",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en"
},
{
"title": "Patch for Denial of Service Vulnerability (CNVD-2016-11388) for multiple Huawei products",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/84128"
},
{
"title": "Multiple Huawei Fixes for product input validation vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65729"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-97593"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "NVD",
"id": "CVE-2016-8773"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/94285"
},
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8773"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-8773"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20161111-01-mpls-cn"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161111-01-mpls-en"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "VULHUB",
"id": "VHN-97593"
},
{
"db": "BID",
"id": "94285"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
},
{
"db": "NVD",
"id": "CVE-2016-8773"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"db": "VULHUB",
"id": "VHN-97593"
},
{
"db": "BID",
"id": "94285"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
},
{
"db": "NVD",
"id": "CVE-2016-8773"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-11-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"date": "2017-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-97593"
},
{
"date": "2016-11-11T00:00:00",
"db": "BID",
"id": "94285"
},
{
"date": "2017-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"date": "2016-11-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201611-370"
},
{
"date": "2017-04-02T20:59:01.407000",
"db": "NVD",
"id": "CVE-2016-8773"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-11-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11388"
},
{
"date": "2017-04-11T00:00:00",
"db": "VULHUB",
"id": "VHN-97593"
},
{
"date": "2016-11-24T01:09:00",
"db": "BID",
"id": "94285"
},
{
"date": "2017-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008266"
},
{
"date": "2016-11-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201611-370"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2016-8773"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple Huawei Service disruption in products (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008266"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201611-370"
}
],
"trust": 0.6
}
}
VAR-201704-0385
Vulnerability from variot - Updated: 2025-04-20 23:22Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow. plural Huawei Campus The product software contains a buffer error vulnerability.Service operation interruption (DoS) An attack may be carried out. Huawei's Campus switch is a series of switches introduced by Huawei. An attacker can exploit this vulnerability by using malformed packets to cause the device to restart abnormally. The following products and versions are affected: Huawei Campus S3700HI V200R001C00SPC300 Version; Campus S5700 V200R002C00SPC100 Version; Campus S7700 V200R003C00SPC300 Version, V200R003C00SPC500 Version; LSW S9700 V200R001C00SPC300 Version, V200R003C00SPC300 Version, V200R003C00SPC500 Version; S2350 V200R003C00SPC300 Version; S2750 V200R003C00SPC300 Version; S5300 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S5700 V200R001C00SPC300 Version, V200R003C00SPC300 Version; S6300 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S6700 S3300HI V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S7700 V200R001C00SPC300 Version; S9300 V200R001C00SPC300 Version, V200R003C00SPC300 Version, V200R003C00SPC500 Version; S9300E V200R003C00SPC300 Version , V200R003C00SPC500 version
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201704-0385",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "campus s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2350",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "lsw s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "lsw s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s2750",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s7700 v200r001c00spc300",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "campus s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "campus s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "lsw s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s3300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "campus s3700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "campus lsw s9700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s2350",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s2750",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s3300hi",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s3700hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s5700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s6700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s7700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s9300e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "s9300 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s3700hi v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 s3300hi v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "lsw s9700 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "lsw s9700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "lsw s9700 v200r003c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s7700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s7700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2750 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
},
{
"db": "NVD",
"id": "CVE-2014-4706"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:campus_lsw_s9700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s2350",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s2750",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s3300hi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:campus_s3700hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s5700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:campus_s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s6300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s6700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s7700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:campus_s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s9300e",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
}
]
},
"cve": "CVE-2014-4706",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2014-4706",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-05106",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-72647",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2014-4706",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-4706",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2014-4706",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2017-05106",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201704-211",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-72647",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "VULHUB",
"id": "VHN-72647"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
},
{
"db": "NVD",
"id": "CVE-2014-4706"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow. plural Huawei Campus The product software contains a buffer error vulnerability.Service operation interruption (DoS) An attack may be carried out. Huawei\u0027s Campus switch is a series of switches introduced by Huawei. An attacker can exploit this vulnerability by using malformed packets to cause the device to restart abnormally. The following products and versions are affected: Huawei Campus S3700HI V200R001C00SPC300 Version; Campus S5700 V200R002C00SPC100 Version; Campus S7700 V200R003C00SPC300 Version, V200R003C00SPC500 Version; LSW S9700 V200R001C00SPC300 Version, V200R003C00SPC300 Version, V200R003C00SPC500 Version; S2350 V200R003C00SPC300 Version; S2750 V200R003C00SPC300 Version; S5300 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S5700 V200R001C00SPC300 Version, V200R003C00SPC300 Version; S6300 V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S6700 S3300HI V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; S7700 V200R001C00SPC300 Version; S9300 V200R001C00SPC300 Version, V200R003C00SPC300 Version, V200R003C00SPC500 Version; S9300E V200R003C00SPC300 Version , V200R003C00SPC500 version",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-4706"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "VULHUB",
"id": "VHN-72647"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-4706",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-05106",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-72647",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "VULHUB",
"id": "VHN-72647"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
},
{
"db": "NVD",
"id": "CVE-2014-4706"
}
]
},
"id": "VAR-201704-0385",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "VULHUB",
"id": "VHN-72647"
}
],
"trust": 1.4788941670588236
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
}
]
},
"last_update_date": "2025-04-20T23:22:24.237000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20140604-01-Campus",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-343218"
},
{
"title": "Huawei Campus series switch heap buffer overflow vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/92441"
},
{
"title": "Huawei Campus Repair of Series Switch Buffer Error Vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=69057"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-72647"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "NVD",
"id": "CVE-2014-4706"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-343218"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4706"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-4706"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "VULHUB",
"id": "VHN-72647"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
},
{
"db": "NVD",
"id": "CVE-2014-4706"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"db": "VULHUB",
"id": "VHN-72647"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
},
{
"db": "NVD",
"id": "CVE-2014-4706"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"date": "2017-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-72647"
},
{
"date": "2017-05-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"date": "2017-04-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-211"
},
{
"date": "2017-04-02T20:59:00.280000",
"db": "NVD",
"id": "CVE-2014-4706"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05106"
},
{
"date": "2017-04-05T00:00:00",
"db": "VULHUB",
"id": "VHN-72647"
},
{
"date": "2017-05-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008276"
},
{
"date": "2017-04-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-211"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2014-4706"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Campus Buffer error vulnerability in product software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008276"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-211"
}
],
"trust": 0.6
}
}
VAR-201711-0985
Vulnerability from variot - Updated: 2025-04-20 23:22AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiAC6005 and other products are all products of China Huawei. HuaweiAC6005 is an access control device. The CloudEngine 12800 is a data center switch device. The OSPF protocol of several Huawei products has a MaxAgeLSA vulnerability. The following products and versions are affected: Huawei AC6005 V200R006C10SPC200 Version; AC6605 V200R006C10SPC200 Version; AR1200 V200R005C10CP0582T Version, V200R005C10HP0581T Version, V200R005C20SPC026T Version; AR200 V200R005C20SPC026T Version; AR3200 V200R005C20SPC026T Version; CloudEngine 12800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 5800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 6800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 7800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 8800 V100R006C00, V200R001C00; E600 V200R008C00; S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00; S1700
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201711-0985",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "secospace usg6600",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v500r001c30"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "secospace usg6600",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v500r001c20"
},
{
"model": "secospace usg6600",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v500r001c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s9700 v200r008c00",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c20spc026t"
},
{
"model": "cloudengine 12800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "cloudengine 12800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "cloudengine 7800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c01"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c01"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "cloudengine 12800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c10hp0581t"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"model": "cloudengine 7800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c10"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "cloudengine 5800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "cloudengine 6800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c10"
},
{
"model": "cloudengine 6800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "cloudengine 5800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c20spc026t"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c10"
},
{
"model": "cloudengine 7800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "cloudengine 7800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c10"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c10"
},
{
"model": "cloudengine 12800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c10"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "ac6605",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c10spc200"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "cloudengine 7800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c01"
},
{
"model": "cloudengine 8800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c03"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c10"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "cloudengine 5800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "e600",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c03"
},
{
"model": "cloudengine 5800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c01"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c10"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "cloudengine 6800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c10"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c10"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "cloudengine 12800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "cloudengine 8800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c20spc026t"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "ac6005",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c10spc200"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c10cp0582t"
},
{
"model": "cloudengine 6800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "cloudengine 6800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "cloudengine 5800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c10"
},
{
"model": "ac6005",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ac6605",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar1200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar3200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine 12800",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine 5800",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine 6800",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine 7800",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine 8800",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "e600",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s1700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "secospace usg6600",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "secospace usg6600 v500r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine v100r003c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "12800"
},
{
"model": "cloudengine v100r005c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "12800"
},
{
"model": "cloudengine v100r005c10",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "12800"
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine v100r006c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "12800"
},
{
"model": "cloudengine v100r005c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "5800"
},
{
"model": "cloudengine v100r005c10",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "5800"
},
{
"model": "cloudengine v100r006c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "5800"
},
{
"model": "cloudengine v100r005c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6800"
},
{
"model": "cloudengine v100r005c10",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6800"
},
{
"model": "cloudengine v100r006c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6800"
},
{
"model": "cloudengine v100r005c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "7800"
},
{
"model": "cloudengine v100r005c10",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "7800"
},
{
"model": "cloudengine v100r006c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "7800"
},
{
"model": "cloudengine v100r006c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "8800"
},
{
"model": "cloudengine v100r003c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "5800"
},
{
"model": "cloudengine v100r003c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6800"
},
{
"model": "cloudengine v100r003c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "7800"
},
{
"model": "cloudengine v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "12800"
},
{
"model": "cloudengine v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6800"
},
{
"model": "cloudengine v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "7800"
},
{
"model": "cloudengine v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "8800"
},
{
"model": "ac6005 v200r006c10spc200",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar1200 v200r005c10cp0582t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar200 v200r005c20spc026t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar3200 v200r005c20spc026t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "secospace usg6600 v500r001c20",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "secospace usg6600 v500r001c30",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ac6605 v200r006c10spc200",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar1200 v200r005c10hp0581t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar1200 v200r005c20spc026t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "cloudengine v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "5800"
},
{
"model": "e600 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v100r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r003c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v100r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r003c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r005c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r005c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r005c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v100r006c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v100r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v100r006c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v100r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v100r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
},
{
"db": "NVD",
"id": "CVE-2017-8147"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:ac6005_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ac6605_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar1200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar3200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:cloudengine_12800_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:cloudengine_5800_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:cloudengine_6800_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:cloudengine_7800_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:cloudengine_8800_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:e600_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s1700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:secospace_usg6600_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
}
]
},
"cve": "CVE-2017-8147",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2017-8147",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-37678",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-116350",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2017-8147",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-8147",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2017-8147",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2017-37678",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201711-982",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-116350",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "VULHUB",
"id": "VHN-116350"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
},
{
"db": "NVD",
"id": "CVE-2017-8147"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 5800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 6800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 7800 with software V100R003C00, V100R005C00, V100R005C10, V100R006C00, V200R001C00,CloudEngine 8800 with software V100R006C00, V200R001C00,E600 V200R008C00,S12700 with software V200R005C00, V200R006C00, V200R007C00, V200R008C00,S1700 with software V100R006C00, V100R007C00, V200R006C00,S2300 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S2700 with software V100R005C00, V100R006C00, V100R006C03, V100R006C05, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00,S5300 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S5700 with software V100R005C00, V100R006C00, V100R006C01, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S6300 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R008C00,S6700 with software V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R003C02, V200R003C10, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S7700 with software V100R003C00, V100R006C00, V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,S9300 with software V100R001C00, V100R002C00, V100R003C00, V100R006C00, V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R008C10,S9700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00,Secospace USG6600 V500R001C00SPC050 have a MaxAge LSA vulnerability due to improper OSPF implementation. When the device receives special LSA packets, the LS (Link Status) age would be set to MaxAge, 3600 seconds. An attacker can exploit this vulnerability to poison the route table and launch a DoS attack. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiAC6005 and other products are all products of China Huawei. HuaweiAC6005 is an access control device. The CloudEngine 12800 is a data center switch device. The OSPF protocol of several Huawei products has a MaxAgeLSA vulnerability. The following products and versions are affected: Huawei AC6005 V200R006C10SPC200 Version; AC6605 V200R006C10SPC200 Version; AR1200 V200R005C10CP0582T Version, V200R005C10HP0581T Version, V200R005C20SPC026T Version; AR200 V200R005C20SPC026T Version; AR3200 V200R005C20SPC026T Version; CloudEngine 12800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 5800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 6800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 7800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version, V200R001C00 Version; CloudEngine 8800 V100R006C00, V200R001C00; E600 V200R008C00; S12700 V200R005C00, V200R006C00, V200R007C00, V200R008C00; S1700",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-8147"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "VULHUB",
"id": "VHN-116350"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-8147",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-37678",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-116350",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "VULHUB",
"id": "VHN-116350"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
},
{
"db": "NVD",
"id": "CVE-2017-8147"
}
]
},
"id": "VAR-201711-0985",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "VULHUB",
"id": "VHN-116350"
}
],
"trust": 1.5393887724999997
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
}
]
},
"last_update_date": "2025-04-20T23:22:08.004000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20170720-01-ospf",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en"
},
{
"title": "A patch for the MaxAgeLSA vulnerability exists in the OSPF protocol of various Huawei products.",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/111227"
},
{
"title": "Multiple Huawei Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76692"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-116350"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "NVD",
"id": "CVE-2017-8147"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170720-01-ospf-en"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8147"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-8147"
},
{
"trust": 0.6,
"url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20170720-01-ospf-cn"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "VULHUB",
"id": "VHN-116350"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
},
{
"db": "NVD",
"id": "CVE-2017-8147"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"db": "VULHUB",
"id": "VHN-116350"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
},
{
"db": "NVD",
"id": "CVE-2017-8147"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"date": "2017-11-22T00:00:00",
"db": "VULHUB",
"id": "VHN-116350"
},
{
"date": "2017-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"date": "2017-11-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-982"
},
{
"date": "2017-11-22T19:29:03.257000",
"db": "NVD",
"id": "CVE-2017-8147"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-37678"
},
{
"date": "2017-12-08T00:00:00",
"db": "VULHUB",
"id": "VHN-116350"
},
{
"date": "2017-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-010631"
},
{
"date": "2020-11-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-982"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-8147"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Vulnerability related to input validation in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-010631"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-982"
}
],
"trust": 0.6
}
}
VAR-201709-0089
Vulnerability from variot - Updated: 2025-04-20 23:15Huawei S7700, S9700, S9300 before V200R07C00SPC500, and AR200, AR1200, AR2200, AR3200 before V200R005C20SPC200 allows attackers with physical access to the CF card to obtain sensitive information. plural Huawei The product contains an information disclosure vulnerability.Information may be obtained. Huawei S7700 is a product of China Huawei. The Huawei S7700, S9700, and S9300 are intelligent routing switches. Huawei AR200, AR1200, AR2200, and AR3200 are multi-service routers for enterprises. Multiple Huawei products are prone to a local information-disclosure vulnerability. Several Huawei products have security vulnerabilities. The following products and versions are affected: Huawei S7700 V200R005C20SPC200 previous version; S9700 V200R005C20SPC200 previous version; S9300 V200R005C20SPC200 previous version; AR200 V200R005C20SPC200 Version; AR1200 V200R005C20SPC200 Version; AR2200 V200R005C20SPC200 Version; AR3200 V200R005C20SPC200 Version
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201709-0089",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ar3200",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c01spc500"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c01spc800"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c01spc200"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c01spc800"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c01spc600"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s9300",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc200"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc200"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc300"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc200"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc800"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc800"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc500"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc600"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc600"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc500"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc600"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc500"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc300"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar1200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar2200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar3200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "200"
},
{
"model": "ar",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "1200"
},
{
"model": "ar",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "2200"
},
{
"model": "ar",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "3200"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07754"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007987"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-303"
},
{
"db": "NVD",
"id": "CVE-2015-7846"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:ar1200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar2200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar3200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007987"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Mickey Shkatov from Intel Advanced Threat Research Team and Jesse Michael from Intel.",
"sources": [
{
"db": "BID",
"id": "76173"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-303"
}
],
"trust": 0.9
},
"cve": "CVE-2015-7846",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2015-7846",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2015-07754",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-85807",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.9,
"id": "CVE-2015-7846",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-7846",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-7846",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2015-07754",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-201511-303",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-85807",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07754"
},
{
"db": "VULHUB",
"id": "VHN-85807"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007987"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-303"
},
{
"db": "NVD",
"id": "CVE-2015-7846"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei S7700, S9700, S9300 before V200R07C00SPC500, and AR200, AR1200, AR2200, AR3200 before V200R005C20SPC200 allows attackers with physical access to the CF card to obtain sensitive information. plural Huawei The product contains an information disclosure vulnerability.Information may be obtained. Huawei S7700 is a product of China Huawei. The Huawei S7700, S9700, and S9300 are intelligent routing switches. Huawei AR200, AR1200, AR2200, and AR3200 are multi-service routers for enterprises. Multiple Huawei products are prone to a local information-disclosure vulnerability. Several Huawei products have security vulnerabilities. The following products and versions are affected: Huawei S7700 V200R005C20SPC200 previous version; S9700 V200R005C20SPC200 previous version; S9300 V200R005C20SPC200 previous version; AR200 V200R005C20SPC200 Version; AR1200 V200R005C20SPC200 Version; AR2200 V200R005C20SPC200 Version; AR3200 V200R005C20SPC200 Version",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-7846"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007987"
},
{
"db": "CNVD",
"id": "CNVD-2015-07754"
},
{
"db": "BID",
"id": "76173"
},
{
"db": "VULHUB",
"id": "VHN-85807"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-7846",
"trust": 3.4
},
{
"db": "BID",
"id": "76173",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007987",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201511-303",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-07754",
"trust": 0.6
},
{
"db": "SEEBUG",
"id": "SSVID-89913",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-85807",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07754"
},
{
"db": "VULHUB",
"id": "VHN-85807"
},
{
"db": "BID",
"id": "76173"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007987"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-303"
},
{
"db": "NVD",
"id": "CVE-2015-7846"
}
]
},
"id": "VAR-201709-0089",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07754"
},
{
"db": "VULHUB",
"id": "VHN-85807"
}
],
"trust": 1.2983125949999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07754"
}
]
},
"last_update_date": "2025-04-20T23:15:58.904000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20150805-01-VRP",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-446634"
},
{
"title": "Patches for multiple Huawei router information disclosure vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/67061"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07754"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007987"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-85807"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007987"
},
{
"db": "NVD",
"id": "CVE-2015-7846"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/76173"
},
{
"trust": 1.7,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446634.htm"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7846"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-7846"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07754"
},
{
"db": "VULHUB",
"id": "VHN-85807"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007987"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-303"
},
{
"db": "NVD",
"id": "CVE-2015-7846"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-07754"
},
{
"db": "VULHUB",
"id": "VHN-85807"
},
{
"db": "BID",
"id": "76173"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007987"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-303"
},
{
"db": "NVD",
"id": "CVE-2015-7846"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07754"
},
{
"date": "2017-09-25T00:00:00",
"db": "VULHUB",
"id": "VHN-85807"
},
{
"date": "2015-08-05T00:00:00",
"db": "BID",
"id": "76173"
},
{
"date": "2017-10-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007987"
},
{
"date": "2015-08-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201511-303"
},
{
"date": "2017-09-25T21:29:00.867000",
"db": "NVD",
"id": "CVE-2015-7846"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07754"
},
{
"date": "2017-10-10T00:00:00",
"db": "VULHUB",
"id": "VHN-85807"
},
{
"date": "2015-12-07T22:16:00",
"db": "BID",
"id": "76173"
},
{
"date": "2017-10-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007987"
},
{
"date": "2015-11-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201511-303"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2015-7846"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "76173"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-303"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Information disclosure vulnerability in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007987"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201511-303"
}
],
"trust": 0.6
}
}
VAR-201706-0187
Vulnerability from variot - Updated: 2025-04-20 23:04The user authentication module in Huawei Campus switches S5700, S5300, S6300, and S6700 with software before V200R001SPH012 and S7700, S9300, and S9700 with software before V200R001SPH015 allows remote attackers to cause a denial of service (device restart) via vectors involving authentication, which trigger an array access violation. Huawei Campus Series Switches are prone to a denial-of-service vulnerability. Attackers can exploit this issue to restart the affected device, denying service to legitimate users. Huawei Campus switches S5700, etc. are all switch products of China's Huawei (Huawei). The user authentication module is a module for user login authentication. The following products and versions are affected: Huawei Campus switches S5700 V200R001SPH012 Version; Campus switches S5300 V200R001SPH012 Version; Campus switches S6300 V200R001SPH012 Version; Campus switches S6700 V200R001SPH012 Version; Campus switches S7700 V200R001SPH012 Version; Campus switches S9300 V200R001SPH012 Version; Campus switches S9700 V200R001SPH012 Version
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201706-0187",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9700",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph012"
},
{
"model": "s5700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph012"
},
{
"model": "s6300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph012"
},
{
"model": "s6700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph012"
},
{
"model": "s7700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph015"
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph015"
},
{
"model": "s9700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph015"
},
{
"model": "s5300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
},
{
"db": "NVD",
"id": "CVE-2015-2800"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "vhunter",
"sources": [
{
"db": "BID",
"id": "73355"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
}
],
"trust": 0.9
},
"cve": "CVE-2015-2800",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2015-2800",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-80761",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2015-2800",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-2800",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-2800",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201504-531",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-80761",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80761"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
},
{
"db": "NVD",
"id": "CVE-2015-2800"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The user authentication module in Huawei Campus switches S5700, S5300, S6300, and S6700 with software before V200R001SPH012 and S7700, S9300, and S9700 with software before V200R001SPH015 allows remote attackers to cause a denial of service (device restart) via vectors involving authentication, which trigger an array access violation. Huawei Campus Series Switches are prone to a denial-of-service vulnerability. \nAttackers can exploit this issue to restart the affected device, denying service to legitimate users. Huawei Campus switches S5700, etc. are all switch products of China\u0027s Huawei (Huawei). The user authentication module is a module for user login authentication. The following products and versions are affected: Huawei Campus switches S5700 V200R001SPH012 Version; Campus switches S5300 V200R001SPH012 Version; Campus switches S6300 V200R001SPH012 Version; Campus switches S6700 V200R001SPH012 Version; Campus switches S7700 V200R001SPH012 Version; Campus switches S9300 V200R001SPH012 Version; Campus switches S9700 V200R001SPH012 Version",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-2800"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "BID",
"id": "73355"
},
{
"db": "VULHUB",
"id": "VHN-80761"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-2800",
"trust": 2.8
},
{
"db": "BID",
"id": "73355",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-80761",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80761"
},
{
"db": "BID",
"id": "73355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
},
{
"db": "NVD",
"id": "CVE-2015-2800"
}
]
},
"id": "VAR-201706-0187",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-80761"
}
],
"trust": 0.6677905914285713
},
"last_update_date": "2025-04-20T23:04:56.644000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20150319-01-Campus switch",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-418554"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80761"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "NVD",
"id": "CVE-2015-2800"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/73355"
},
{
"trust": 1.7,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-418554.htm"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2800"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-2800"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-418554.htm"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80761"
},
{
"db": "BID",
"id": "73355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
},
{
"db": "NVD",
"id": "CVE-2015-2800"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-80761"
},
{
"db": "BID",
"id": "73355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
},
{
"db": "NVD",
"id": "CVE-2015-2800"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-08T00:00:00",
"db": "VULHUB",
"id": "VHN-80761"
},
{
"date": "2015-03-19T00:00:00",
"db": "BID",
"id": "73355"
},
{
"date": "2017-07-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"date": "2015-03-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201504-531"
},
{
"date": "2017-06-08T16:29:00.403000",
"db": "NVD",
"id": "CVE-2015-2800"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-80761"
},
{
"date": "2015-05-07T17:22:00",
"db": "BID",
"id": "73355"
},
{
"date": "2017-07-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007609"
},
{
"date": "2017-06-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201504-531"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2015-2800"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Campus Service operation interruption in user authentication module of switch products (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007609"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201504-531"
}
],
"trust": 0.6
}
}
VAR-201609-0096
Vulnerability from variot - Updated: 2025-04-13 23:37Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets. The Huawei S7700, S9300, S9700, and S12700 are Huawei's intelligent routing switches. A remote denial of service vulnerability exists in several HuaweiSwitches. The following products and versions are affected: Huawei S9300 V200R001C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S5300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R006C00 , V200R007C00 , V200R008C00 , S5700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R003C02 , V200R005C00 , V200R006C00 , V200R008C00 , S6300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R008C00 , S6700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R008C00 , S7700 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S9700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00, V200R005C00, V200R006C00, V200R008C00, S12700 V200R005C00, V200R006C00, V200R008C00
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201609-0096",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9300",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c01"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c01"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r006c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r001c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r006c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c02",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c02",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c01",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c02",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r006c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r001c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r006c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r003sph019",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r003sph019",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r003sph019",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005sph012",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005sph012",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li v200r003sph011",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003sph019",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "v200r008sph005",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "7700"
},
{
"model": "v200r003sph019",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "7700"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "BID",
"id": "92968"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
},
{
"db": "NVD",
"id": "CVE-2016-6518"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:s12700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s6300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s6700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s7700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported the issue.",
"sources": [
{
"db": "BID",
"id": "92968"
}
],
"trust": 0.3
},
"cve": "CVE-2016-6518",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-6518",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 4.9,
"id": "CNVD-2016-08070",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-95338",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2016-6518",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-6518",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2016-6518",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2016-08070",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-201609-365",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-95338",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "VULHUB",
"id": "VHN-95338"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
},
{
"db": "NVD",
"id": "CVE-2016-6518"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets. The Huawei S7700, S9300, S9700, and S12700 are Huawei\u0027s intelligent routing switches. A remote denial of service vulnerability exists in several HuaweiSwitches. The following products and versions are affected: Huawei S9300 V200R001C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S5300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R006C00 , V200R007C00 , V200R008C00 , S5700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R003C02 , V200R005C00 , V200R006C00 , V200R008C00 , S6300 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R005C01 , V200R005C02 , V200R008C00 , S6700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00 , V200R008C00 , S7700 V200R001C00 , V200R002C00 , V200R003C00 , V200R005C00 , V200R006C00 , V200R008C00 , S9700 V200R001C00 , V200R001C01 , V200R002C00 , V200R003C00, V200R005C00, V200R006C00, V200R008C00, S12700 V200R005C00, V200R006C00, V200R008C00",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-6518"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "BID",
"id": "92968"
},
{
"db": "VULHUB",
"id": "VHN-95338"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-6518",
"trust": 3.4
},
{
"db": "BID",
"id": "92968",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-08070",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-95338",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "VULHUB",
"id": "VHN-95338"
},
{
"db": "BID",
"id": "92968"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
},
{
"db": "NVD",
"id": "CVE-2016-6518"
}
]
},
"id": "VAR-201609-0096",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "VULHUB",
"id": "VHN-95338"
}
],
"trust": 1.5114362174358975
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
}
]
},
"last_update_date": "2025-04-13T23:37:28.220000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160914-01-sep",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en"
},
{
"title": "Patches for several HuaweiSwitches Remote Denial of Service Vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/81677"
},
{
"title": "Multiple Huawei Repair measures for product remote denial of service vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64163"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-95338"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "NVD",
"id": "CVE-2016-6518"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en"
},
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/92968"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6518"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6518"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "VULHUB",
"id": "VHN-95338"
},
{
"db": "BID",
"id": "92968"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
},
{
"db": "NVD",
"id": "CVE-2016-6518"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"db": "VULHUB",
"id": "VHN-95338"
},
{
"db": "BID",
"id": "92968"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
},
{
"db": "NVD",
"id": "CVE-2016-6518"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"date": "2016-09-26T00:00:00",
"db": "VULHUB",
"id": "VHN-95338"
},
{
"date": "2016-09-14T00:00:00",
"db": "BID",
"id": "92968"
},
{
"date": "2016-10-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"date": "2016-09-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-365"
},
{
"date": "2016-09-26T15:59:01.780000",
"db": "NVD",
"id": "CVE-2016-6518"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-08070"
},
{
"date": "2016-09-28T00:00:00",
"db": "VULHUB",
"id": "VHN-95338"
},
{
"date": "2016-09-14T00:00:00",
"db": "BID",
"id": "92968"
},
{
"date": "2016-10-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-005041"
},
{
"date": "2016-09-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-365"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-6518"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Service disruption on devices (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-005041"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201609-365"
}
],
"trust": 0.6
}
}
VAR-201604-0306
Vulnerability from variot - Updated: 2025-04-13 23:36Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic. Huawei S9300, S5700, S5300, S9300, and S7700 are all S series switches of Huawei. There are security vulnerabilities in various HuaweiQuidway switches. Multiple Huawei Quidway S-Series Switches are prone to a denial-of-service vulnerability. Huawei Quidway S9700, S5700, S5300, S9300, and S7700 are all S-series switch products of China's Huawei (Huawei). The following products and versions are affected: Huawei Quidway S9700, S5700, S5300, S9300, and S7700 using software versions earlier than V200R003SPH012
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201604-0306",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "quidway s9700",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5700",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s7700",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "quidway",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph012"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
},
{
"db": "NVD",
"id": "CVE-2016-3678"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:quidway_s5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:quidway_s5700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:quidway_s7700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:quidway_s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:quidway_s9700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:quidway_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "85731"
}
],
"trust": 0.3
},
"cve": "CVE-2016-3678",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-3678",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-02160",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-92497",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2016-3678",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-3678",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2016-3678",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2016-02160",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201604-178",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-92497",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "VULHUB",
"id": "VHN-92497"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
},
{
"db": "NVD",
"id": "CVE-2016-3678"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic. Huawei S9300, S5700, S5300, S9300, and S7700 are all S series switches of Huawei. There are security vulnerabilities in various HuaweiQuidway switches. Multiple Huawei Quidway S-Series Switches are prone to a denial-of-service vulnerability. Huawei Quidway S9700, S5700, S5300, S9300, and S7700 are all S-series switch products of China\u0027s Huawei (Huawei). The following products and versions are affected: Huawei Quidway S9700, S5700, S5300, S9300, and S7700 using software versions earlier than V200R003SPH012",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-3678"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "BID",
"id": "85731"
},
{
"db": "VULHUB",
"id": "VHN-92497"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-3678",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-02160",
"trust": 0.6
},
{
"db": "BID",
"id": "85731",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-92497",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "VULHUB",
"id": "VHN-92497"
},
{
"db": "BID",
"id": "85731"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
},
{
"db": "NVD",
"id": "CVE-2016-3678"
}
]
},
"id": "VAR-201604-0306",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "VULHUB",
"id": "VHN-92497"
}
],
"trust": 1.2724911933333334
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
}
]
},
"last_update_date": "2025-04-13T23:36:24.989000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160330-01-switch",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en"
},
{
"title": "Patches for multiple HuaweiQuidway switch denial of service vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/73980"
},
{
"title": "Multiple Huawei Quidway Repair measures for switch denial of service vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60879"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-92497"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "NVD",
"id": "CVE-2016-3678"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-3678"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-3678"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "VULHUB",
"id": "VHN-92497"
},
{
"db": "BID",
"id": "85731"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
},
{
"db": "NVD",
"id": "CVE-2016-3678"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"db": "VULHUB",
"id": "VHN-92497"
},
{
"db": "BID",
"id": "85731"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
},
{
"db": "NVD",
"id": "CVE-2016-3678"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"date": "2016-04-11T00:00:00",
"db": "VULHUB",
"id": "VHN-92497"
},
{
"date": "2016-03-30T00:00:00",
"db": "BID",
"id": "85731"
},
{
"date": "2016-04-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"date": "2016-04-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-178"
},
{
"date": "2016-04-11T15:59:10.597000",
"db": "NVD",
"id": "CVE-2016-3678"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02160"
},
{
"date": "2016-04-14T00:00:00",
"db": "VULHUB",
"id": "VHN-92497"
},
{
"date": "2016-03-30T00:00:00",
"db": "BID",
"id": "85731"
},
{
"date": "2016-04-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-002072"
},
{
"date": "2016-04-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-178"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-3678"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Quidway Denial of service in switch product software (DoS) Vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-002072"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-178"
}
],
"trust": 0.6
}
}
VAR-201604-0327
Vulnerability from variot - Updated: 2025-04-13 23:36Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets. HuaweiS5300EI is a Huawei S series switch product. The HuaweiS5300EI handles memory leaks in ICMPv6 packets, allowing remote attackers to exploit vulnerabilities to submit special requests for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. The Huawei S5300EI and others are all S-series switch products of China's Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: Huawei S5300EI, S5300SI, S5310HI, S6300EI, S2350EI, S5300LI, S9300, S7700, and S9700 using software V200R001C00, V200R002C00, and V200R003C00;
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201604-0327",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9300",
"scope": "lt",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "lt",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "lt",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph023"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5310hi",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s2350ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5310hi",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2350ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s3300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s9700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s3300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s5300li",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300li",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s9300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph023"
},
{
"model": "s9300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s7700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s6300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300si",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s7700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s7700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph023"
},
{
"model": "s5300si",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2350ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300li",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph023"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s6300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s3300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph023"
},
{
"model": "s3300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5310hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph023"
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s7700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s5310hi",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s7700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300si",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s5300ei v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720ei 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:s2300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2350ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2350ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300li",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300li_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300si",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300si_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5310hi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5310hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s6300ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s7700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported the issue.",
"sources": [
{
"db": "BID",
"id": "90893"
}
],
"trust": 0.3
},
"cve": "CVE-2015-8676",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2015-8676",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "CNVD-2016-02290",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-86637",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2015-8676",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-8676",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-8676",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2016-02290",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201604-313",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-86637",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "VULHUB",
"id": "VHN-86637"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets. HuaweiS5300EI is a Huawei S series switch product. The HuaweiS5300EI handles memory leaks in ICMPv6 packets, allowing remote attackers to exploit vulnerabilities to submit special requests for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. The Huawei S5300EI and others are all S-series switch products of China\u0027s Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: Huawei S5300EI, S5300SI, S5310HI, S6300EI, S2350EI, S5300LI, S9300, S7700, and S9700 using software V200R001C00, V200R002C00, and V200R003C00;",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8676"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "BID",
"id": "90893"
},
{
"db": "VULHUB",
"id": "VHN-86637"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8676",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-02290",
"trust": 0.6
},
{
"db": "BID",
"id": "90893",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-86637",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "VULHUB",
"id": "VHN-86637"
},
{
"db": "BID",
"id": "90893"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"id": "VAR-201604-0327",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "VULHUB",
"id": "VHN-86637"
}
],
"trust": 1.61575809
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
}
]
},
"last_update_date": "2025-04-13T23:36:24.954000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20160113-02-Switch",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en"
},
{
"title": "Patches for various Huawei product switches ICMPv6 packet memory leak vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/74357"
},
{
"title": "Multiple Huawei Product memory leak vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60968"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
},
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86637"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8676"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8676"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "VULHUB",
"id": "VHN-86637"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"db": "VULHUB",
"id": "VHN-86637"
},
{
"db": "BID",
"id": "90893"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"date": "2016-04-14T00:00:00",
"db": "VULHUB",
"id": "VHN-86637"
},
{
"date": "2016-01-13T00:00:00",
"db": "BID",
"id": "90893"
},
{
"date": "2016-04-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"date": "2016-04-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"date": "2016-04-14T15:59:02.980000",
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02290"
},
{
"date": "2019-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-86637"
},
{
"date": "2016-07-06T14:51:00",
"db": "BID",
"id": "90893"
},
{
"date": "2016-04-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007104"
},
{
"date": "2016-04-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-313"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-8676"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Service disruption in products (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007104"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-313"
}
],
"trust": 0.6
}
}
VAR-201609-0171
Vulnerability from variot - Updated: 2025-04-13 23:32Huawei S7700, S9300, S9700, and S12700 devices with software before V200R008C00SPC500 use random numbers with insufficient entropy to generate self-signed certificates, which makes it easier for remote attackers to discover private keys by leveraging knowledge of a certificate. HuaweiS7700 is an intelligent routing switch of China Huawei. An insecure random number generation vulnerability exists in several Huawei products. The following products and versions are affected: Huawei S7700, S9300, S9700, and versions earlier than S12700 V200R008C00SPC500
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201609-0171",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s7700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r003c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.9,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r008c00spc500"
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r008c00spc500"
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r008c00spc500"
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r008c00spc500"
},
{
"model": "s6700 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s3700 v100r006c05",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 v100r006c05",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r003c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v100r006c05",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r003c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c05",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005sph012",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005sph012",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005sph012",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005sph012",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s3700 v100r006sph028",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 v100r006sph028",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r005sph012",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r005c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v100r006sph028",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005sph012",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006sph028",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-06343"
},
{
"db": "BID",
"id": "92438"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004560"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-286"
},
{
"db": "NVD",
"id": "CVE-2016-6670"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:s12700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s7700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004560"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Nadia Heninger, Joshua Fried and Marcella Hastings from the University of Pennsylvania, Frank Gifford from FactorMyNumber.com.",
"sources": [
{
"db": "BID",
"id": "92438"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-286"
}
],
"trust": 0.9
},
"cve": "CVE-2016-6670",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2016-6670",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2016-06343",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-95490",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"id": "CVE-2016-6670",
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-6670",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2016-6670",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2016-06343",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201608-286",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-95490",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-06343"
},
{
"db": "VULHUB",
"id": "VHN-95490"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004560"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-286"
},
{
"db": "NVD",
"id": "CVE-2016-6670"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei S7700, S9300, S9700, and S12700 devices with software before V200R008C00SPC500 use random numbers with insufficient entropy to generate self-signed certificates, which makes it easier for remote attackers to discover private keys by leveraging knowledge of a certificate. HuaweiS7700 is an intelligent routing switch of China Huawei. An insecure random number generation vulnerability exists in several Huawei products. The following products and versions are affected: Huawei S7700, S9300, S9700, and versions earlier than S12700 V200R008C00SPC500",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-6670"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004560"
},
{
"db": "CNVD",
"id": "CNVD-2016-06343"
},
{
"db": "BID",
"id": "92438"
},
{
"db": "VULHUB",
"id": "VHN-95490"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-6670",
"trust": 3.4
},
{
"db": "BID",
"id": "92438",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004560",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201608-286",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-06343",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-95490",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-06343"
},
{
"db": "VULHUB",
"id": "VHN-95490"
},
{
"db": "BID",
"id": "92438"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004560"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-286"
},
{
"db": "NVD",
"id": "CVE-2016-6670"
}
]
},
"id": "VAR-201609-0171",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-06343"
},
{
"db": "VULHUB",
"id": "VHN-95490"
}
],
"trust": 1.4397481563999999
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-06343"
}
]
},
"last_update_date": "2025-04-13T23:32:37.887000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160810-01-certificate",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-certificate-en"
},
{
"title": "Patches for multiple Huawei product insecure random number generation vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/80446"
},
{
"title": "Multiple Huawei Repair measures for product insecure random number generation vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63658"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-06343"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004560"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-286"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-95490"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004560"
},
{
"db": "NVD",
"id": "CVE-2016-6670"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/92438"
},
{
"trust": 2.0,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-certificate-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6670"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6670"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-06343"
},
{
"db": "VULHUB",
"id": "VHN-95490"
},
{
"db": "BID",
"id": "92438"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004560"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-286"
},
{
"db": "NVD",
"id": "CVE-2016-6670"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-06343"
},
{
"db": "VULHUB",
"id": "VHN-95490"
},
{
"db": "BID",
"id": "92438"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004560"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-286"
},
{
"db": "NVD",
"id": "CVE-2016-6670"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-06343"
},
{
"date": "2016-09-07T00:00:00",
"db": "VULHUB",
"id": "VHN-95490"
},
{
"date": "2016-08-10T00:00:00",
"db": "BID",
"id": "92438"
},
{
"date": "2016-09-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004560"
},
{
"date": "2016-08-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-286"
},
{
"date": "2016-09-07T19:28:13.380000",
"db": "NVD",
"id": "CVE-2016-6670"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-06343"
},
{
"date": "2016-09-08T00:00:00",
"db": "VULHUB",
"id": "VHN-95490"
},
{
"date": "2016-11-24T09:05:00",
"db": "BID",
"id": "92438"
},
{
"date": "2016-09-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004560"
},
{
"date": "2016-09-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-286"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-6670"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-286"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Vulnerability of obtaining private key in device software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004560"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-286"
}
],
"trust": 0.6
}
}
VAR-201610-0307
Vulnerability from variot - Updated: 2025-04-13 23:21Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage. plural Huawei There is a vulnerability in the product software that allows the encryption key and ciphertext password to be obtained. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). Remote attackers can use the keystore to exploit this vulnerability to gain administrator privileges and crack hard-coded keys and ciphertext passwords. The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201610-0307",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ar",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c10"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c30"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc500"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c20"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "quidway s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "quidway s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "quidway s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "quidway s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "ar",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar router",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00spc100"
},
{
"model": "quidway s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "quidway s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r008c00spc500"
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "ar routers",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r006c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r005c00spc300",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li v200r006c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r002c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r003c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r003c00spc300",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r002c00spc100",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300 v200r001c00spc300",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r005c30",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r005c20",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r005c10",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r003",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r002",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r001",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r007c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r009c00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300 v200r007c00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r007c00spc100",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
},
{
"db": "NVD",
"id": "CVE-2015-8086"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:ar",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:quidway_s5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:quidway_s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:quidway_s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:quidway_s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s12700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "76897"
}
],
"trust": 0.3
},
"cve": "CVE-2015-8086",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CVE-2015-8086",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-07446",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-86047",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.2,
"id": "CVE-2015-8086",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-8086",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-8086",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2015-07446",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201511-337",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-86047",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86047"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
},
{
"db": "NVD",
"id": "CVE-2015-8086"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 makes it easier for remote authenticated administrators to obtain encryption keys and ciphertext passwords via vectors related to key storage. plural Huawei There is a vulnerability in the product software that allows the encryption key and ciphertext password to be obtained. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). Remote attackers can use the keystore to exploit this vulnerability to gain administrator privileges and crack hard-coded keys and ciphertext passwords. The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300 ",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8086"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "VULHUB",
"id": "VHN-86047"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8086",
"trust": 3.4
},
{
"db": "BID",
"id": "76897",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201511-337",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-07446",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-86047",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86047"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
},
{
"db": "NVD",
"id": "CVE-2015-8086"
}
]
},
"id": "VAR-201610-0307",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86047"
}
],
"trust": 1.4761443282352942
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
}
]
},
"last_update_date": "2025-04-13T23:21:05.162000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20150930-01-Routers",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-326",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86047"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "NVD",
"id": "CVE-2015-8086"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/76897"
},
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8086"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8086"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
},
{
"trust": 0.3,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-455876.htm"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86047"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
},
{
"db": "NVD",
"id": "CVE-2015-8086"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86047"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
},
{
"db": "NVD",
"id": "CVE-2015-8086"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"date": "2016-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-86047"
},
{
"date": "2015-09-30T00:00:00",
"db": "BID",
"id": "76897"
},
{
"date": "2016-10-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"date": "2015-09-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201511-337"
},
{
"date": "2016-10-03T21:59:04.893000",
"db": "NVD",
"id": "CVE-2015-8086"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-86047"
},
{
"date": "2016-09-19T17:00:00",
"db": "BID",
"id": "76897"
},
{
"date": "2016-10-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007262"
},
{
"date": "2016-10-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201511-337"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-8086"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Vulnerability in obtaining encryption key and ciphertext password in product software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007262"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201511-337"
}
],
"trust": 0.6
}
}
VAR-201610-0306
Vulnerability from variot - Updated: 2025-04-13 23:21Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm. plural Huawei There is a vulnerability in the product software that can obtain and decrypt passwords. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. http://cwe.mitre.org/data/definitions/326.htmlA remotely authenticated administrator can use a choice of reversible encryption algorithms to obtain and decrypt passwords. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201610-0306",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc500"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c30"
},
{
"model": "quidway s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "quidway s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c10"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c20"
},
{
"model": "quidway s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "quidway s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "ar",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "ar",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar router",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00spc100"
},
{
"model": "quidway s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "quidway s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r008c00spc500"
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "ar routers",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r006c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r005c00spc300",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li v200r006c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r002c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r003c00spc500",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r003c00spc300",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r002c00spc100",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300 v200r001c00spc300",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r005c30",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r005c20",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r005c10",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r003",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r002",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r001",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r007c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00spc500",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300 v200r009c00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s5300 v200r007c00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar v200r007c00spc100",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
},
{
"db": "NVD",
"id": "CVE-2015-8085"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:ar",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:quidway_s5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:quidway_s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:quidway_s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:quidway_s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s12700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "76897"
}
],
"trust": 0.3
},
"cve": "CVE-2015-8085",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CVE-2015-8085",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-07446",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-86046",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.2,
"id": "CVE-2015-8085",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-8085",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-8085",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2015-07446",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-757",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-86046",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86046"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
},
{
"db": "NVD",
"id": "CVE-2015-8085"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm. plural Huawei There is a vulnerability in the product software that can obtain and decrypt passwords. Supplementary information : CWE Vulnerability type by CWE-326: Inadequate Encryption Strength ( Incorrect cipher strength ) Has been identified. http://cwe.mitre.org/data/definitions/326.htmlA remotely authenticated administrator can use a choice of reversible encryption algorithms to obtain and decrypt passwords. Huawei AR Routers is an AR series router product from China Huawei. An information disclosure vulnerability exists in Huawei AR Routers. An attacker could exploit this vulnerability to obtain sensitive information. Huawei AR, etc. are routing switches of China Huawei (Huawei). The following products and versions are affected: Huawei AR V200R001 , V200R002 , V200R003 , V200R005C10 , V200R005C20 , V200R005C30 ; Quidway S9300 V200R003C00SPC500 , V200R002C00SPC100 , V200R001C00SPC300 ; S12700 V200R006C00 , V200R005C00 ; S9300 V200R006C00SPC500 , V200R005C00SPC300 ; Quidway S5300 V200R001C00SPC300 ",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8085"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "VULHUB",
"id": "VHN-86046"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8085",
"trust": 3.4
},
{
"db": "BID",
"id": "76897",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201510-757",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-07446",
"trust": 0.6
},
{
"db": "SEEBUG",
"id": "SSVID-89742",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-86046",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86046"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
},
{
"db": "NVD",
"id": "CVE-2015-8085"
}
]
},
"id": "VAR-201610-0306",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86046"
}
],
"trust": 1.4761443282352942
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
}
]
},
"last_update_date": "2025-04-13T23:21:05.127000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20150930-01-Routers",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-326",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86046"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "NVD",
"id": "CVE-2015-8085"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/76897"
},
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-455876"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8085"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8085"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
},
{
"trust": 0.3,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-455876.htm"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86046"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
},
{
"db": "NVD",
"id": "CVE-2015-8085"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"db": "VULHUB",
"id": "VHN-86046"
},
{
"db": "BID",
"id": "76897"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
},
{
"db": "NVD",
"id": "CVE-2015-8085"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"date": "2016-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-86046"
},
{
"date": "2015-09-30T00:00:00",
"db": "BID",
"id": "76897"
},
{
"date": "2016-10-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"date": "2015-09-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-757"
},
{
"date": "2016-10-03T21:59:03.800000",
"db": "NVD",
"id": "CVE-2015-8085"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07446"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-86046"
},
{
"date": "2016-09-19T17:00:00",
"db": "BID",
"id": "76897"
},
{
"date": "2016-10-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007261"
},
{
"date": "2016-10-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-757"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-8085"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Vulnerability in obtaining password in product software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007261"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-757"
}
],
"trust": 0.6
}
}
VAR-201604-0328
Vulnerability from variot - Updated: 2025-04-13 23:18Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information. HuaweiS5300EI is a Huawei S series switch product. A number of Huawei products have a memory leak vulnerability in the HTTPS or SFTP server, allowing remote attackers to consume memory and log in and out of the HTTPS or SFTP server for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause a memory exhaustion, denying service to legitimate users. The Huawei S5300EI and others are all S-series switch products of China's Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: using V200R003C00 version and V200R005C00 version software Huawei S5300EI , S5300SI , S5310HI , S6300EI ,use V200R003C00 Version, V200R005C00 version and V200R006C00 version software Huawei S2350EI , S5300LI , S9300 , S7700 , S9700 ,use V200R006C00 version software Huawei S5720HI, S5720EI, Huawei S2300, S3300 using V100R006C05 software
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201604-0328",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s2350ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5310hi",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005sph009"
},
{
"model": "s7700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s7700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph003"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s5310hi",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s9700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph003"
},
{
"model": "s9700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s3300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s2300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s3300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s7700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005sph009"
},
{
"model": "s2350ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9700",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005sph009"
},
{
"model": "s5300li",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300li",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s9300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s7700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5720hi",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5720hi",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s6300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300si",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5300li",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5720ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5300si",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001sph018"
},
{
"model": "s7700",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9300",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2350ei",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph003"
},
{
"model": "s9300",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5720ei",
"scope": "lt",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s9700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2350ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph009"
},
{
"model": "s5310hi",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300si",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300li",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s9700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph003"
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph009"
},
{
"model": "s5720hi",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s7700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5720ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s3300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s3300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s6300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5720ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph002"
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph009"
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5720ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5310hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph003"
},
{
"model": "s5720hi",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s7700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006sph022"
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300li",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s2300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s9700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006sph003"
},
{
"model": "s2350ei",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s7700",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003sph011"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005sph008"
},
{
"model": "s9300",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5310hi",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5300si",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5310hi 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720ei 200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720ei",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300li",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:s2300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2350ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2350ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300li",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300li_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300si",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300si_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5310hi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5310hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5720ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5720ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5720hi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5720hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s6300ei",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s7700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported the issue.",
"sources": [
{
"db": "BID",
"id": "90912"
}
],
"trust": 0.3
},
"cve": "CVE-2015-8677",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "CVE-2015-8677",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "CNVD-2016-02289",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "VHN-86638",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.8,
"id": "CVE-2015-8677",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-8677",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-8677",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2016-02289",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201604-314",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-86638",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2015-8677",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "VULHUB",
"id": "VHN-86638"
},
{
"db": "VULMON",
"id": "CVE-2015-8677"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information. HuaweiS5300EI is a Huawei S series switch product. A number of Huawei products have a memory leak vulnerability in the HTTPS or SFTP server, allowing remote attackers to consume memory and log in and out of the HTTPS or SFTP server for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to cause a memory exhaustion, denying service to legitimate users. The Huawei S5300EI and others are all S-series switch products of China\u0027s Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: using V200R003C00 version and V200R005C00 version software Huawei S5300EI , S5300SI , S5310HI , S6300EI ,use V200R003C00 Version, V200R005C00 version and V200R006C00 version software Huawei S2350EI , S5300LI , S9300 , S7700 , S9700 ,use V200R006C00 version software Huawei S5720HI, S5720EI, Huawei S2300, S3300 using V100R006C05 software",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8677"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "BID",
"id": "90912"
},
{
"db": "VULHUB",
"id": "VHN-86638"
},
{
"db": "VULMON",
"id": "CVE-2015-8677"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8677",
"trust": 3.5
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-02289",
"trust": 0.6
},
{
"db": "BID",
"id": "90912",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-86638",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2015-8677",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "VULHUB",
"id": "VHN-86638"
},
{
"db": "VULMON",
"id": "CVE-2015-8677"
},
{
"db": "BID",
"id": "90912"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"id": "VAR-201604-0328",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "VULHUB",
"id": "VHN-86638"
}
],
"trust": 1.61575809
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
}
]
},
"last_update_date": "2025-04-13T23:18:00.533000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20160113-03-Switch",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
},
{
"title": "Patches for various Huawei product switch memory leak vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/74355"
},
{
"title": "Multiple Huawei Product memory leak vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60969"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86638"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8677"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8677"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/399.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.securityfocus.com/bid/90912"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "VULHUB",
"id": "VHN-86638"
},
{
"db": "VULMON",
"id": "CVE-2015-8677"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"db": "VULHUB",
"id": "VHN-86638"
},
{
"db": "VULMON",
"id": "CVE-2015-8677"
},
{
"db": "BID",
"id": "90912"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"date": "2016-04-14T00:00:00",
"db": "VULHUB",
"id": "VHN-86638"
},
{
"date": "2016-04-14T00:00:00",
"db": "VULMON",
"id": "CVE-2015-8677"
},
{
"date": "2016-01-13T00:00:00",
"db": "BID",
"id": "90912"
},
{
"date": "2016-05-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"date": "2016-04-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"date": "2016-04-14T15:59:03.857000",
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02289"
},
{
"date": "2019-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-86638"
},
{
"date": "2019-06-20T00:00:00",
"db": "VULMON",
"id": "CVE-2015-8677"
},
{
"date": "2016-07-06T14:51:00",
"db": "BID",
"id": "90912"
},
{
"date": "2016-05-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007108"
},
{
"date": "2016-04-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-314"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-8677"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Service disruption in products (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007108"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-314"
}
],
"trust": 0.6
}
}
VAR-201306-0006
Vulnerability from variot - Updated: 2025-04-11 23:05The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world's leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei's mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. Successful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. The following are vulnerable: Huawei Quidway series Huawei CX600 V600R001 Huawei CX600 V600R003C00SPC900 Huawei ME60 V600R002C07 and prior versions AR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products ===========================================
[ADVISORY INFORMATION] Title: Weak password encryption on Huawei products Release date: 13/11/2012 Credits: Roberto Paleari, Emaze Networks (roberto.paleari@emaze.net) Ivan Speziale, Emaze Networks (ivan.speziale@emaze.net)
[VULNERABILITY INFORMATION] Class: Information disclosure
[AFFECTED PRODUCTS] We confirm the presence of this security vulnerability on the following products: * Huawei Quidway series * Huawei CX600
Other models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a victim's device can be deciphered instantaneously.
A Python procedure that decodes a given password is included below. Upon termination, procedure decrypt_password() returns the clear-text password.
from Crypto.Cipher import DES
def decode_char(c): if c == 'a': r = '?' else: r = c return ord(r) - ord('!')
def ascii_to_binary(s): assert len(s) == 24
out = [0]*18
i = 0
j = 0
for i in range(0, len(s), 4):
y = decode_char(s[i + 0])
y = (y << 6) & 0xffffff
k = decode_char(s[i + 1])
y = (y | k) & 0xffffff
y = (y << 6) & 0xffffff
k = decode_char(s[i + 2])
y = (y | k) & 0xffffff
y = (y << 6) & 0xffffff
k = decode_char(s[i + 3])
y = (y | k) & 0xffffff
out[j+2] = chr(y & 0xff)
out[j+1] = chr((y>>8) & 0xff)
out[j+0] = chr((y>>16) & 0xff)
j += 3
return "".join(out)
def decrypt_password(p): r = ascii_to_binary(p)
r = r[:16]
d = DES.new("\x01\x02\x03\x04\x05\x06\x07\x08", DES.MODE_ECB)
r = d.decrypt(r)
return r.rstrip("\x00")
[REMEDIATION] We recommend to store passwords using a proper hashing algorithm, instead of leveraging symmetric encryption. Further details are available at the following URL: http://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141
[COPYRIGHT] Copyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. Permission is hereby granted to redistribute this advisory, providing that no changes are made and that the copyright notices and disclaimers remain intact.
[DISCLAIMER] Emaze Networks S.p.A is not responsible for the misuse of the information provided in our security advisories. These advisories are a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "acu",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003c01spc100"
},
{
"_id": null,
"model": "acu",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"_id": null,
"model": "acu",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00spc100"
},
{
"_id": null,
"model": "ar g3",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"_id": null,
"model": "ar g3",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"_id": null,
"model": "ar g3",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00spc200"
},
{
"_id": null,
"model": "atn",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"_id": null,
"model": "atn",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"_id": null,
"model": "cx200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "cx300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002"
},
{
"_id": null,
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"_id": null,
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"_id": null,
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "e200e-b",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"_id": null,
"model": "e200e-c",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200e-x1",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"_id": null,
"model": "e200e-x2",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"_id": null,
"model": "eudemon1000",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c02"
},
{
"_id": null,
"model": "eudemon1000e-u",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "eudemon1000e-x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002"
},
{
"_id": null,
"model": "eudemon100e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r007"
},
{
"_id": null,
"model": "eudemon200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "eudemon300",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c02"
},
{
"_id": null,
"model": "eudemon500",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c02"
},
{
"_id": null,
"model": "eudemon8000e-x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00spc600"
},
{
"_id": null,
"model": "ma5200g",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003"
},
{
"_id": null,
"model": "ma5200g",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"_id": null,
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"_id": null,
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r005c00spc600"
},
{
"_id": null,
"model": "ne20",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005"
},
{
"_id": null,
"model": "ne40",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r005"
},
{
"_id": null,
"model": "ne40e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"_id": null,
"model": "ne5000e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r007"
},
{
"_id": null,
"model": "ne5000e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v800r002"
},
{
"_id": null,
"model": "ne80",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r005"
},
{
"_id": null,
"model": "ne80e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"_id": null,
"model": "ne80e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"_id": null,
"model": "ne80e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "nip100",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"_id": null,
"model": "nip1000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"_id": null,
"model": "nip200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"_id": null,
"model": "nip2100",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"_id": null,
"model": "nip2200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"_id": null,
"model": "nip5100",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"_id": null,
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"_id": null,
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"_id": null,
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s2700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"_id": null,
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"_id": null,
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s3300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s3300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s3700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "s3700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s3700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"_id": null,
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"_id": null,
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s5300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s5300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s5306",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s5306",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"_id": null,
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"_id": null,
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"_id": null,
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"_id": null,
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "svn2000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"_id": null,
"model": "svn3000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002c02spc802b041"
},
{
"_id": null,
"model": "svn5000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"_id": null,
"model": "svn5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c01b019"
},
{
"_id": null,
"model": "wlan ac 6605",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"_id": null,
"model": "wlan ac 6605",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00spc100"
},
{
"_id": null,
"model": "cx600",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "e200x7",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200x5",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200x3",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200e-usg2100",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"_id": null,
"model": "eudemon usg9500",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc600"
},
{
"_id": null,
"model": "ar 19\\/29\\/49",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r2207"
},
{
"_id": null,
"model": "e200 usg2200",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "eudemon 8080e",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"_id": null,
"model": "eudemon usg9300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"_id": null,
"model": "ne40e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v300r005"
},
{
"_id": null,
"model": "ne20e-x6",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v300r005"
},
{
"_id": null,
"model": "ne40e\\/80e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "eudemon 8160e",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"_id": null,
"model": "ne40e\\/80e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v600r002"
},
{
"_id": null,
"model": "h3c ar\\",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r2209"
},
{
"_id": null,
"model": "eudemon usg5300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "eudemon usg5500",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"_id": null,
"model": "e200 usg5100",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ar 19/29/49",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "r2207"
},
{
"_id": null,
"model": "e200e-x3",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200e-x5",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200e-x7",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200e/usg2100",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"_id": null,
"model": "e200e/usg2200",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200e/usg5100",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "eudemon8080e",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"_id": null,
"model": "eudemon8160e",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"_id": null,
"model": "eudemonusg5300",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "eudemonusg5500",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002"
},
{
"_id": null,
"model": "eudemonusg9300",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"_id": null,
"model": "eudemonusg9500",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00spc600"
},
{
"_id": null,
"model": "h3c ar",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "ar x9 series r2209"
},
{
"_id": null,
"model": "ne20e-x6",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "ne40e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"_id": null,
"model": "ne40e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"_id": null,
"model": "ne40e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"_id": null,
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"_id": null,
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"_id": null,
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "ne80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"_id": null,
"model": "s2700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "ne5000e v300r007",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ne5000e v800r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ma5200g v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ma5200g v300r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ne40e/80e",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "atn v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "atn v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ne40/ne80 v300r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ne20e-x6 v600r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ne20 v200r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "me60",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "cx200/cx300 v100r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "acu v100r003c01spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "acu v200r001c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "acu v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "wlan ac v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"_id": null,
"model": "wlan ac v200r001c00spc100",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"_id": null,
"model": "s9300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "s7700",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "s2300/s3300/s5300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "s2300/s3300/s5300/s2700/s3 v100r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "s2300/s3300/s5300/s3300hi/ v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "s3300hi/s5300hi/s5306/s630 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ar g3 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ar g3 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ar g3 v200r002c00spc200",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "h3c ar ar series r2209",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c=x9"
},
{
"_id": null,
"model": "ar r2207",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "19/29/49\u003c="
},
{
"_id": null,
"model": "eudemon100e v200r007",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "eudemon200 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "eudemon300\u0026500\u00261000 v200r006c02",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "eudemon1000e-u/usg5300 v200r001",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "eudemon1000e-x/usg5500 v200r002",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "eudemon8080e\u00268160e/usg9300 v100r003c00",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "eudemon8000e-x/usg9500 v200r001c00spc600",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "e200e-c\u0026x3\u0026x5\u0026x7/usg2200\u00265100 v200r003c00",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "e200e-b\u0026x1\u0026x2/usg2100 v100r005c01",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "svn5300 v100r001c01b019",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "svn2000\u00265000 series v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "svn3000 v100r002c02spc802b041",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "nip100/200/1000 v100r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "nip2100\u00262200\u00265100 v100r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "quidway series",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "quidway series",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"_id": null,
"model": "me60 v600r002c07",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "cx600 v600r003c00spc900",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "cx600 v600r001",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ar r2207",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "19/29/49"
},
{
"_id": null,
"model": "me60 v600r005c00spc900",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "cx600 v600r005c00spc900",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "cx600 v600r003c00spca00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ar r2209",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "19/29/49"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:acu",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_19%2F29%2F49",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_g3",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:atn",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:cx200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:cx300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:cx600",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200e-b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200e-c",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200e-x1",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200e-x2",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200x3",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200x5",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200x7",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200e-usg2100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200_usg2200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200_usg5100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon1000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon1000e-u",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon1000e-x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon100e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon8000e-x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon_8080e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon_8160e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon_usg5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon_usg5500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon_usg9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon_usg9500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:h3c_ar%28oem_in%29",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ma5200g",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:me60",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne20",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne20e-x6",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne40",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne40e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne40e%2F80e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne5000e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne80",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne80e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:nip100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:nip1000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:nip200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:nip2100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:nip2200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:nip5100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3300hi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300hi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5306",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s6300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s6700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s7700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:svn2000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:svn3000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:svn5000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:svn5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:wlan_ac_6605",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
}
]
},
"credits": {
"_id": null,
"data": "Roberto Paleari and Ivan Speziale from Emaze Networks",
"sources": [
{
"db": "BID",
"id": "56510"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
}
],
"trust": 0.9
},
"cve": "CVE-2012-4960",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CVE-2012-4960",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT DEFINED",
"baseScore": 6.5,
"collateralDamagePotential": "LOW-MEDIUM",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT DEFINED",
"enviromentalScore": 5.1,
"exploitability": "FUNCTIONAL",
"exploitabilityScore": 8.0,
"id": "CVE-2012-4960",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT DEFINED",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"remediationLevel": "OFFICIAL FIX",
"reportConfidence": "CONFIRMED",
"severity": "MEDIUM",
"targetDistribution": "MEDIUM",
"trust": 0.8,
"userInteractionRequired": null,
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CNVD-2013-08074",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-58241",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2012-4960",
"trust": 1.6,
"value": "MEDIUM"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2012-4960",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2013-08074",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201306-403",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-58241",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"description": {
"_id": null,
"data": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world\u0027s leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei\u0027s mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. \nSuccessful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. \nThe following are vulnerable:\nHuawei Quidway series\nHuawei CX600 V600R001\nHuawei CX600 V600R003C00SPC900\nHuawei ME60 V600R002C07 and prior versions\nAR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products\n===========================================\n\n[ADVISORY INFORMATION]\nTitle:\t\tWeak password encryption on Huawei products\nRelease date: 13/11/2012\nCredits: \tRoberto Paleari, Emaze Networks (roberto.paleari@emaze.net)\n\t\tIvan Speziale, Emaze Networks (ivan.speziale@emaze.net)\n\n[VULNERABILITY INFORMATION]\nClass: \t Information disclosure\n\n[AFFECTED PRODUCTS]\nWe confirm the presence of this security vulnerability on the following\nproducts:\n * Huawei Quidway series\n * Huawei CX600\n\nOther models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a\nvictim\u0027s device can be deciphered instantaneously. \n\nA Python procedure that decodes a given password is included below. Upon\ntermination, procedure decrypt_password() returns the clear-text password. \n\n\u003ccut\u003e\nfrom Crypto.Cipher import DES\n\ndef decode_char(c):\n if c == \u0027a\u0027:\n r = \u0027?\u0027\n else:\n r = c\n return ord(r) - ord(\u0027!\u0027)\n\ndef ascii_to_binary(s):\n assert len(s) == 24\n\n out = [0]*18\n i = 0\n j = 0\n\n for i in range(0, len(s), 4):\n y = decode_char(s[i + 0])\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 1])\n y = (y | k) \u0026 0xffffff\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 2])\n y = (y | k) \u0026 0xffffff\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 3])\n y = (y | k) \u0026 0xffffff\n\n out[j+2] = chr(y \u0026 0xff)\n out[j+1] = chr((y\u003e\u003e8) \u0026 0xff)\n out[j+0] = chr((y\u003e\u003e16) \u0026 0xff)\n\n j += 3\n\n return \"\".join(out)\n\ndef decrypt_password(p):\n r = ascii_to_binary(p)\n\n r = r[:16]\n\n d = DES.new(\"\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\", DES.MODE_ECB)\n r = d.decrypt(r)\n\n return r.rstrip(\"\\x00\")\n\u003c/cut\u003e\n\n\n[REMEDIATION] \nWe recommend to store passwords using a proper hashing algorithm, instead of\nleveraging symmetric encryption. Further details are available at the following URL:\nhttp://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141\n\n[COPYRIGHT]\nCopyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. \nPermission is hereby granted to redistribute this advisory, providing that no\nchanges are made and that the copyright notices and disclaimers remain intact. \n\n[DISCLAIMER]\nEmaze Networks S.p.A is not responsible for the misuse of the information\nprovided in our security advisories. These advisories are a service to the\nprofessional security community. There are NO WARRANTIES with regard to this\ninformation. Any application or distribution of this information constitutes\nacceptance AS IS, at the user\u0027s own risk. This information is subject to change\nwithout notice",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "PACKETSTORM",
"id": "118054"
}
],
"trust": 3.87
},
"exploit_availability": {
"_id": null,
"data": [
{
"reference": "https://www.kb.cert.org/vuls/id/948096",
"trust": 0.8,
"type": "unknown"
},
{
"reference": "https://www.scap.org.cn/vuln/vhn-58241",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "VULHUB",
"id": "VHN-58241"
}
]
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2012-4960",
"trust": 3.4
},
{
"db": "CERT/CC",
"id": "VU#948096",
"trust": 2.7
},
{
"db": "BID",
"id": "56510",
"trust": 1.6
},
{
"db": "JVN",
"id": "JVNVU90202792",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004",
"trust": 0.8
},
{
"db": "PACKETSTORM",
"id": "118054",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2013-08074",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2012-6517",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403",
"trust": 0.6
},
{
"db": "EXPLOIT-DB",
"id": "38020",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-58241",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "PACKETSTORM",
"id": "118054"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"id": "VAR-201306-0006",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
}
],
"trust": 2.165337808214286
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 1.2
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
}
]
},
"last_update_date": "2025-04-11T23:05:36.641000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Huawei-SA-20120827-01-CX600",
"trust": 0.8,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
},
{
"title": "Huawei multiple product encryption is not a strong vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/34800"
},
{
"title": "Huawei patch for multiple product password encryption vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/25088"
},
{
"title": "Huawei Fixing measures for vulnerabilities of encryption problems in many products",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=170984"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-310",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.3,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
},
{
"trust": 1.9,
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"trust": 0.8,
"url": "about vulnerability notes"
},
{
"trust": 0.8,
"url": "contact us about this vulnerability"
},
{
"trust": 0.8,
"url": "provide a vendor statement"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4960"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu90202792/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4960"
},
{
"trust": 0.6,
"url": "http://packetstormsecurity.org/files/118054/huawei-weak-password-encryption.html"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/56510"
},
{
"trust": 0.4,
"url": "http://support.huawei.com/enterprise/readlatestnewsaction.action?contentid=news1000001141"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/"
},
{
"trust": 0.3,
"url": "msg://bugtraq/201211130911.qad9ba1q022014@sf01web1.securityfocus.com"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "PACKETSTORM",
"id": "118054"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "CERT/CC",
"id": "VU#948096",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2013-08074",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2012-6517",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-58241",
"ident": null
},
{
"db": "BID",
"id": "56510",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "118054",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2012-4960",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2013-08-05T00:00:00",
"db": "CERT/CC",
"id": "VU#948096",
"ident": null
},
{
"date": "2013-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08074",
"ident": null
},
{
"date": "2012-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-6517",
"ident": null
},
{
"date": "2013-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-58241",
"ident": null
},
{
"date": "2012-11-13T00:00:00",
"db": "BID",
"id": "56510",
"ident": null
},
{
"date": "2013-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006004",
"ident": null
},
{
"date": "2012-11-13T23:22:55",
"db": "PACKETSTORM",
"id": "118054",
"ident": null
},
{
"date": "2012-11-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201211-280",
"ident": null
},
{
"date": "2013-06-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-403",
"ident": null
},
{
"date": "2013-06-20T15:55:00.897000",
"db": "NVD",
"id": "CVE-2012-4960",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2013-10-03T00:00:00",
"db": "CERT/CC",
"id": "VU#948096",
"ident": null
},
{
"date": "2013-07-01T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08074",
"ident": null
},
{
"date": "2012-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-6517",
"ident": null
},
{
"date": "2013-08-22T00:00:00",
"db": "VULHUB",
"id": "VHN-58241",
"ident": null
},
{
"date": "2015-03-19T08:28:00",
"db": "BID",
"id": "56510",
"ident": null
},
{
"date": "2013-08-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006004",
"ident": null
},
{
"date": "2012-12-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201211-280",
"ident": null
},
{
"date": "2021-11-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-403",
"ident": null
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2012-4960",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
],
"trust": 1.2
},
"title": {
"_id": null,
"data": "Huawei networking equipment weak password cipher",
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
],
"trust": 1.2
}
}
VAR-201801-0045
Vulnerability from variot - Updated: 2024-11-23 22:59Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiCampusS9300 and other products are all products of China Huawei. CampusS9300 and other devices are all switch devices. WLAN AC6005 and so on are all access controller devices. eSapsoftwareplatform is a set of ESAP software platforms running on it. A heap buffer overflow vulnerability exists in eSapsoftwareplatform in several Huawei products. The Campus S9300 and others are switches. The following products and versions are affected: Huawei Campus S9300/ S7700/ S9700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC500 Version; Campus S5300/ S5700/ S6300/ S6700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; AR150/ AR160/ AR200/ AR1200/ AR2200/ AR3200/ AR530/ NetEngine16EX/ SRG1300/ SRG2300/ SRG3300 series router V200R003C01SPC900 Version, V200R003C01SPC300 Version, V200R003C01SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC100 Version, V200R005C00SPC100 Version, V200R005C00SPC200 Version; WLAN AC6005/6605 V200R003C00SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC300 Version , V200R003C00SPC500 version, V200R005C00SPC100 version; WLAN ACU2 V200R005C00SPC100 version
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201801-0045",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wlan ac6605",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "wlan ac6605",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "wlan ac6005",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "wlan ac6005",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "wlan ac6605",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "wlan ac6005",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "wlan acu2",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "wlan ac6005",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "wlan ac6605",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "wlan ac6605",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "ar160",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "srg3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar530",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc100"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "ar1200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc200"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "ar200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc100"
},
{
"model": "srg1300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "ar3200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "ar150",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc300"
},
{
"model": "netengine16ex",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc900"
},
{
"model": "wlan ac6005",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc100"
},
{
"model": "srg2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c01spc100"
},
{
"model": "ar2200",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc200"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "ar1200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar150",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar160",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar2200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar3200",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar530",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s5700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s6300",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s6700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "campus s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "netengine16ex",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "srg1300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "srg2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "srg3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac 6005",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac 6605",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware"
},
{
"model": "wlan acu2",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus s7700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s7700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9300 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9300 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9300 v200r003c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s7700 v200r003c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9700 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s9700 v200r003c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5300 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5300 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5300 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5700 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s5700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6300 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6300 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6300 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6700 v200r001c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6700 v200r002c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "campus s6700 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan v200r003c00spc100",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "wlan v200r003c00spc200",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "wlan v200r003c00spc300",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "wlan v200r003c00spc500",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "wlan v200r005c00spc100",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "wlan ac6005 v200r003c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac6005 v200r003c00spc200",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac6005 v200r003c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac6005 v200r003c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac6005 v200r005c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan acu2 v200r005c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
},
{
"db": "NVD",
"id": "CVE-2014-4705"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:ar1200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar150_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar160_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar2200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar3200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ar530_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s5700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s6300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:campus_s6700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:campus_s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:campus_s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:campus_s9700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:netengine16ex_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:srg1300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:srg2300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:srg3300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:wlan_ac6005_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:wlan_ac_6605",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:wlan_acu2_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
}
]
},
"cve": "CVE-2014-4705",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2014-4705",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-03422",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-72646",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2014-4705",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-4705",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2014-4705",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2018-03422",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201801-1088",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-72646",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "VULHUB",
"id": "VHN-72646"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
},
{
"db": "NVD",
"id": "CVE-2014-4705"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple heap-based buffer overflows in the eSap software platform in Huawei Campus S9300, S7700, S9700, S5300, S5700, S6300, and S6700 series switches; AR150, AR160, AR200, AR1200, AR2200, AR3200, AR530, NetEngine16EX, SRG1300, SRG2300, and SRG3300 series routers; and WLAN AC6005, AC6605, and ACU2 access controllers allow remote attackers to cause a denial of service (device restart) via a crafted length field in a packet. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiCampusS9300 and other products are all products of China Huawei. CampusS9300 and other devices are all switch devices. WLAN AC6005 and so on are all access controller devices. eSapsoftwareplatform is a set of ESAP software platforms running on it. A heap buffer overflow vulnerability exists in eSapsoftwareplatform in several Huawei products. The Campus S9300 and others are switches. The following products and versions are affected: Huawei Campus S9300/ S7700/ S9700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC500 Version; Campus S5300/ S5700/ S6300/ S6700 Series switch V200R001C00SPC300 Version, V200R002C00SPC100 Version, V200R003C00SPC300 Version; AR150/ AR160/ AR200/ AR1200/ AR2200/ AR3200/ AR530/ NetEngine16EX/ SRG1300/ SRG2300/ SRG3300 series router V200R003C01SPC900 Version, V200R003C01SPC300 Version, V200R003C01SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC100 Version, V200R005C00SPC100 Version, V200R005C00SPC200 Version; WLAN AC6005/6605 V200R003C00SPC100 Version, V200R003C00SPC200 Version, V200R003C00SPC300 Version , V200R003C00SPC500 version, V200R005C00SPC100 version; WLAN ACU2 V200R005C00SPC100 version",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-4705"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "VULHUB",
"id": "VHN-72646"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-4705",
"trust": 3.1
},
{
"db": "SECUNIA",
"id": "59349",
"trust": 2.3
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2018-03422",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-72646",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "VULHUB",
"id": "VHN-72646"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
},
{
"db": "NVD",
"id": "CVE-2014-4705"
}
]
},
"id": "VAR-201801-0045",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "VULHUB",
"id": "VHN-72646"
}
],
"trust": 1.507588440869565
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
}
]
},
"last_update_date": "2024-11-23T22:59:07.864000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20140616-01-eSap",
"trust": 0.8,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm"
},
{
"title": "Patch of various Huawei products eSapsoftwareplatform heap buffer overflow vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/116581"
},
{
"title": "Multiple Huawei product eSap software platform Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=78164"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-72646"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "NVD",
"id": "CVE-2014-4705"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://secunia.com/advisories/59349"
},
{
"trust": 2.3,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345171.htm"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4705"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-4705"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "VULHUB",
"id": "VHN-72646"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
},
{
"db": "NVD",
"id": "CVE-2014-4705"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"db": "VULHUB",
"id": "VHN-72646"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
},
{
"db": "NVD",
"id": "CVE-2014-4705"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-02-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"date": "2018-01-30T00:00:00",
"db": "VULHUB",
"id": "VHN-72646"
},
{
"date": "2018-03-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"date": "2018-01-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-1088"
},
{
"date": "2018-01-30T17:29:00.227000",
"db": "NVD",
"id": "CVE-2014-4705"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-02-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-03422"
},
{
"date": "2018-02-26T00:00:00",
"db": "VULHUB",
"id": "VHN-72646"
},
{
"date": "2018-03-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008513"
},
{
"date": "2018-01-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-1088"
},
{
"date": "2024-11-21T02:10:45.170000",
"db": "NVD",
"id": "CVE-2014-4705"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Product buffer error vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008513"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201801-1088"
}
],
"trust": 0.6
}
}
VAR-201801-0087
Vulnerability from variot - Updated: 2024-11-23 22:59Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal. plural Huawei Campus A switch product contains an information disclosure vulnerability.Information may be obtained. Huawei Campus Series Switches is China's Huawei series of Campus switches. Huawei Campus Series Switches has a user enumeration vulnerability that allows an attacker to exploit a vulnerability to obtain a valid username and initiate further attacks. An attacker may leverage this issue to harvest valid usernames, which may aid in further attacks. A remote attacker can use this vulnerability to log in to the server through SSH to guess whether a user name exists on the switch device based on the information returned by the server
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201801-0087",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s3700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus series switches",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:s2300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300e_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei",
"sources": [
{
"db": "BID",
"id": "69302"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
],
"trust": 0.9
},
"cve": "CVE-2014-5394",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2014-5394",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-05162",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-73335",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.2,
"id": "CVE-2014-5394",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-5394",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2014-5394",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2014-05162",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201408-326",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-73335",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal. plural Huawei Campus A switch product contains an information disclosure vulnerability.Information may be obtained. Huawei Campus Series Switches is China\u0027s Huawei series of Campus switches. Huawei Campus Series Switches has a user enumeration vulnerability that allows an attacker to exploit a vulnerability to obtain a valid username and initiate further attacks. \nAn attacker may leverage this issue to harvest valid usernames, which may aid in further attacks. A remote attacker can use this vulnerability to log in to the server through SSH to guess whether a user name exists on the switch device based on the information returned by the server",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-5394"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "BID",
"id": "69302"
},
{
"db": "VULHUB",
"id": "VHN-73335"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-5394",
"trust": 2.8
},
{
"db": "BID",
"id": "69302",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2014-05162",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-73335",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "BID",
"id": "69302"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"id": "VAR-201801-0087",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
}
],
"trust": 1.307947909090909
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
}
]
},
"last_update_date": "2024-11-23T22:59:07.827000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20140820-01-Campus Switch",
"trust": 0.8,
"url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701"
},
{
"title": "Huawei Campus Series Switches User Enumeration Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/49234"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/69302"
},
{
"trust": 1.7,
"url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5394"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-5394"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "BID",
"id": "69302"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-08-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"date": "2018-01-08T00:00:00",
"db": "VULHUB",
"id": "VHN-73335"
},
{
"date": "2014-08-20T00:00:00",
"db": "BID",
"id": "69302"
},
{
"date": "2018-02-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"date": "2014-08-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"date": "2018-01-08T19:29:00.610000",
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-08-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"date": "2018-01-29T00:00:00",
"db": "VULHUB",
"id": "VHN-73335"
},
{
"date": "2015-03-19T09:24:00",
"db": "BID",
"id": "69302"
},
{
"date": "2018-02-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"date": "2018-01-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"date": "2024-11-21T02:11:58.220000",
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Campus Information disclosure vulnerability in switch products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
],
"trust": 0.6
}
}
VAR-201906-0055
Vulnerability from variot - Updated: 2024-11-23 22:16Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109). Vendors have confirmed this vulnerability HWPSIRT-2019-03109 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. The vulnerability stems from the program's insufficient verification of specific parameters of Http messages. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R010C00 Version, V200R012C00 Version, V200R013C00 Version, V200R011C10 Version; S1700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version, V200R011C10 Version, V200R012C00 Version, V200R013C00 version; S2300 V200R003C00 version, etc
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201906-0055",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s9300x",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s9300x",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s9300x",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s7900",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s600-e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s600-e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s600-e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7900",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s9300x",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c10"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s600-e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7900",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r011c10"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r013c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r012c00"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s600-e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s1700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s600-e",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r012c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r013c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r011c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r011c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r012c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "NVD",
"id": "CVE-2019-5285"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s1700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s600-e_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "This vulnerability is by Chi Anxin Codesafe Team of Legendsec of eack Report to Huawei PSIRT .",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
],
"trust": 0.6
},
"cve": "CVE-2019-5285",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2019-5285",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-25515",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-156720",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2019-5285",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-5285",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2019-5285",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2019-25515",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201905-947",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-156720",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "VULHUB",
"id": "VHN-156720"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
},
{
"db": "NVD",
"id": "CVE-2019-5285"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109). Vendors have confirmed this vulnerability HWPSIRT-2019-03109 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China\u0027s Huawei company. The vulnerability stems from the program\u0027s insufficient verification of specific parameters of Http messages. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R010C00 Version, V200R012C00 Version, V200R013C00 Version, V200R011C10 Version; S1700 V200R008C00 Version, V200R009C00 Version, V200R010C00 Version, V200R011C10 Version, V200R012C00 Version, V200R013C00 version; S2300 V200R003C00 version, etc",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-5285"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "VULHUB",
"id": "VHN-156720"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-5285",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201905-947",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2019-25515",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-156720",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "VULHUB",
"id": "VHN-156720"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
},
{
"db": "NVD",
"id": "CVE-2019-5285"
}
]
},
"id": "VAR-201906-0055",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "VULHUB",
"id": "VHN-156720"
}
],
"trust": 1.4999441774999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
}
]
},
"last_update_date": "2024-11-23T22:16:59.884000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20190522-01-switch",
"trust": 0.8,
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en"
},
{
"title": "Multiple HuaweiS series switches enter patches for verification error vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/172831"
},
{
"title": "Multiple Huawei S Repair measures for series switch security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92902"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-156720"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "NVD",
"id": "CVE-2019-5285"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190522-01-switch-en"
},
{
"trust": 1.8,
"url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-5285"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5285"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "VULHUB",
"id": "VHN-156720"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
},
{
"db": "NVD",
"id": "CVE-2019-5285"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"db": "VULHUB",
"id": "VHN-156720"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
},
{
"db": "NVD",
"id": "CVE-2019-5285"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-08-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"date": "2019-06-04T00:00:00",
"db": "VULHUB",
"id": "VHN-156720"
},
{
"date": "2019-06-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"date": "2019-05-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201905-947"
},
{
"date": "2019-06-04T19:29:00.477000",
"db": "NVD",
"id": "CVE-2019-5285"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-08-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-25515"
},
{
"date": "2019-07-26T00:00:00",
"db": "VULHUB",
"id": "VHN-156720"
},
{
"date": "2019-06-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005143"
},
{
"date": "2019-07-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201905-947"
},
{
"date": "2024-11-21T04:44:40.310000",
"db": "NVD",
"id": "CVE-2019-5285"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei S Series switch vulnerability in input confirmation",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005143"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201905-947"
}
],
"trust": 0.6
}
}
VAR-201403-0710
Vulnerability from variot - Updated: 2022-05-17 02:00Huawei Ethernet Switches is a switch device developed by Huawei. Huawei Ethernet Switches have errors when the device processes certain Y.1731 messages, allowing an attacker to exploit a vulnerability to submit a specially crafted message to overload the device. Huawei multiple Ethernet switches are prone to a denial-of-service vulnerability. Successfully exploiting this issue will result in a denial-of-service condition to the legitimate users
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201403-0710",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s9300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300/s3300/s5300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01858"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "66284"
}
],
"trust": 0.3
},
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-01858",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "CNVD",
"id": "CNVD-2014-01858",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01858"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei Ethernet Switches is a switch device developed by Huawei. Huawei Ethernet Switches have errors when the device processes certain Y.1731 messages, allowing an attacker to exploit a vulnerability to submit a specially crafted message to overload the device. Huawei multiple Ethernet switches are prone to a denial-of-service vulnerability. \nSuccessfully exploiting this issue will result in a denial-of-service condition to the legitimate users",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01858"
},
{
"db": "BID",
"id": "66284"
}
],
"trust": 0.81
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "66284",
"trust": 0.9
},
{
"db": "SECUNIA",
"id": "57308",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2014-01858",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01858"
},
{
"db": "BID",
"id": "66284"
}
]
},
"id": "VAR-201403-0710",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01858"
}
],
"trust": 1.3440817666666667
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01858"
}
]
},
"last_update_date": "2022-05-17T02:00:02.283000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei Ethernet Switches Denial of Service Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/44402"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01858"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 0.6,
"url": "http://secunia.com/advisories/57308/"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01858"
},
{
"db": "BID",
"id": "66284"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2014-01858"
},
{
"db": "BID",
"id": "66284"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-03-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-01858"
},
{
"date": "2014-03-17T00:00:00",
"db": "BID",
"id": "66284"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-03-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-01858"
},
{
"date": "2014-03-17T00:00:00",
"db": "BID",
"id": "66284"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "66284"
}
],
"trust": 0.3
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei Ethernet Switches Denial of Service Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01858"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Failure to Handle Exceptional Conditions",
"sources": [
{
"db": "BID",
"id": "66284"
}
],
"trust": 0.3
}
}
CVE-2012-4960 (GCVE-0-2012-4960)
Vulnerability from nvd – Published: 2013-06-20 15:00 – Updated: 2024-08-06 20:50- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:50:18.270Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-12-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-08-22T09:00:00",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-4960",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#948096",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2012-4960",
"datePublished": "2013-06-20T15:00:00",
"dateReserved": "2012-09-17T00:00:00",
"dateUpdated": "2024-08-06T20:50:18.270Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4960 (GCVE-0-2012-4960)
Vulnerability from cvelistv5 – Published: 2013-06-20 15:00 – Updated: 2024-08-06 20:50- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:50:18.270Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-12-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-08-22T09:00:00",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-4960",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#948096",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2012-4960",
"datePublished": "2013-06-20T15:00:00",
"dateReserved": "2012-09-17T00:00:00",
"dateUpdated": "2024-08-06T20:50:18.270Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}