FKIE_CVE-2014-9694

Vulnerability from fkie_nvd - Published: 2017-04-02 20:59 - Updated: 2025-04-20 01:37
Summary
Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions have a CSRF vulnerability. The products do not use the Token mechanism for web access control. When users log in to the Huawei servers and access websites containing the malicious CSRF script, the CSRF script is executed, which may cause configuration tampering and system restart.
Impacted products
Vendor Product Version
huawei tecal_rh1288_v2_firmware *
huawei tecal_rh1288_v2 -
huawei tecal_rh2265_v2_firmware v100r002c00
huawei tecal_rh2265_v2 -
huawei tecal_rh2285_v2_firmware *
huawei tecal_rh2285_v2 -
huawei tecal_rh2265_v2_firmware v100r002c00
huawei tecal_rh2265_v2 -
huawei tecal_rh2285h_v2_firmware *
huawei tecal_rh2285h_v2 -
huawei tecal_rh2268_v2_firmware v100r002c00
huawei tecal_rh2268_v2 -
huawei tecal_rh2288_v2_firmware *
huawei tecal_rh2288_v2 -
huawei tecal_rh2288h_v2_firmware *
huawei tecal_rh2288h_v2 -
huawei tecal_rh2485_v2_firmware *
huawei tecal_rh2485_v2 -
huawei tecal_rh5885_v2_firmware *
huawei tecal_rh5885_v2 -
huawei tecal_rh5885_v3_firmware *
huawei tecal_rh5885_v3 -
huawei tecal_rh5885h_v3_firmware *
huawei tecal_rh5885h_v3 -
huawei tecal_xh310_v2_firmware *
huawei tecal_xh310_v2 -
huawei tecal_xh311_v2_firmware *
huawei tecal_xh311_v2 -
huawei tecal_xh320_v2_firmware *
huawei tecal_xh320_v2 -
huawei tecal_xh621_v2_firmware *
huawei tecal_xh621_v2 -
huawei tecal_dh310_v2_firmware *
huawei tecal_dh310_v2 -
huawei tecal_dh320_v2_firmware *
huawei tecal_dh320_v2 -
huawei tecal_dh620_v2_firmware *
huawei tecal_dh620_v2 -
huawei tecal_dh621_v2_firmware *
huawei tecal_dh621_v2 -
huawei tecal_dh628_v2_firmware *
huawei tecal_dh628_v2 -
huawei tecal_bh620_v2_firmware *
huawei tecal_bh620_v2 -
huawei tecal_bh621_v2_firmware *
huawei tecal_bh621_v2 -
huawei tecal_bh622_v2_firmware *
huawei tecal_bh622_v2 -
huawei tecal_bh640_v2_firmware *
huawei tecal_bh640_v2 -
huawei tecal_ch121_firmware *
huawei tecal_ch121 -
huawei tecal_ch140_firmware *
huawei tecal_ch140 -
huawei tecal_ch220_firmware *
huawei tecal_ch220 -
huawei tecal_ch221_firmware *
huawei tecal_ch221 -
huawei tecal_ch222_firmware *
huawei tecal_ch222 -
huawei tecal_ch240_firmware *
huawei tecal_ch240 -
huawei tecal_ch242_firmware *
huawei tecal_ch242 -
huawei tecal_ch242_v3_firmware *
huawei tecal_ch242_v3 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_rh1288_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2C2F69-83AD-45BE-9709-8A48797F893D",
              "versionEndIncluding": "v100r002c00spc107",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_rh1288_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AC92821-38A2-4781-BB08-FA71BF628078",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_rh2265_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "29F99CBD-AE58-46E8-9A6B-F94F6DEDA064",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_rh2265_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4ED35D0-3602-44DC-94C0-1707321579C6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_rh2285_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BB5A3C2-DF8E-4ED4-938C-9CDD70161AB8",
              "versionEndIncluding": "v100r002c00spc115",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_rh2285_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6305C3E3-129E-406A-9108-44453E800929",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_rh2265_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "29F99CBD-AE58-46E8-9A6B-F94F6DEDA064",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_rh2265_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4ED35D0-3602-44DC-94C0-1707321579C6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_rh2285h_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F0B36B6-8393-457A-AC22-47DD71FEE956",
              "versionEndIncluding": "v100r002c00spc111",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_rh2285h_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1B7DBA-174E-4864-B912-D8B256169EDA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_rh2268_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "70D81D9D-C450-4DB5-AD65-B606A15FBDA4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_rh2268_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB179150-07AA-4844-A41A-051894331EA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_rh2288_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB00FBD7-D732-40F7-BC59-7C9610CA8965",
              "versionEndIncluding": "v100r002c00spc117",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_rh2288_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CC25D1D-441B-45B7-BBFF-4BDB534BC6AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_rh2288h_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1BF46E7-C242-4000-9CB3-F2F0EACCD689",
              "versionEndIncluding": "v100r002c00spc115",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_rh2288h_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51CE9690-15F6-4365-8E07-4F9DEC2E9057",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_rh2485_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B311B07-7D93-444F-A810-905D76B722C8",
              "versionEndIncluding": "v100r002c00spc502",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_rh2485_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC25EDD5-5F78-4F56-BC83-9D32EF4B0A1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_rh5885_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59BF6DA1-E696-40B6-976E-FE5B1C44D7D8",
              "versionEndIncluding": "v100r001c02spc109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_rh5885_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40729502-86A1-483D-9A6E-988165E6E8F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_rh5885_v3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5017F1-C71A-4459-AB87-4BD835733D28",
              "versionEndIncluding": "v100r003c01spc102",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_rh5885_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0FAEAC5-69E6-49F4-A4F5-0CB621EB0C95",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_rh5885h_v3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6652C18-0385-4E4C-BE7B-27E1EC26B68A",
              "versionEndIncluding": "v100r003c00spc102",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_rh5885h_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C152F05-9744-4BFC-BE2F-D6C686ABDE61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_xh310_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7ABDCC-7C6D-486C-AF92-1130ADFAB0AB",
              "versionEndIncluding": "v100r001c00spc110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_xh310_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E60D022-0CAB-4DFB-8C7D-19556E60DA93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_xh311_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA906B1-F1E4-4A2E-B708-100EA190C87F",
              "versionEndIncluding": "v100r001c00spc110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_xh311_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D58DEE0E-6233-4715-8D0A-43991FC7F07D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_xh320_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D94016D-3999-493C-90AA-2A8206D05D95",
              "versionEndIncluding": "v100r001c00spc110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_xh320_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5119D0F0-6560-4B4C-BBB2-A1CAA15832C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_xh621_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCD772A-EE02-4DF9-906D-DC9C39ADBF23",
              "versionEndIncluding": "v100r001c00spc106",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_xh621_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E46FFD27-D336-4CDB-904B-F74529636F83",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_dh310_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7DC4D98-CEDA-4EE6-9501-D6892C86D101",
              "versionEndIncluding": "v100r001c00spc110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_dh310_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F327C3B4-7019-447A-B67B-A77C67BBFBC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_dh320_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C566532-3583-4485-A2BB-CCCAE5974356",
              "versionEndIncluding": "v100r001c00spc106",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_dh320_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F818AAC-57B2-4BF7-B71C-68FBEBEC3D38",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_dh620_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5AF2FB8-A03C-4F7C-B46D-55FE06F88FA7",
              "versionEndIncluding": "v100r001c00spc106",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_dh620_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47941440-E37A-4899-8009-A041CE5983F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_dh621_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "708DE5FE-F6D4-4FD0-BEA3-D9EF8517839C",
              "versionEndIncluding": "v100r001c00spc107",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_dh621_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BF6CB81-5FA2-4069-BD93-BDC2B53A4417",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_dh628_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73637A3F-7FFE-4009-9372-52A496A105C6",
              "versionEndIncluding": "v100r001c00spc107",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_dh628_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C033CEB6-AED2-4265-8D6B-563A26BEA0B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_bh620_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01752DF0-C3D5-461A-856C-11467AC0C7EE",
              "versionEndIncluding": "v100r002c00spc107",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_bh620_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97D0FB60-C4C0-4F83-9277-8F1882425C36",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_bh621_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8508D466-2991-4C5F-87D5-E4ABC9869188",
              "versionEndIncluding": "v100r002c00spc106",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_bh621_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "256DDC18-CF91-4E43-B582-14A48C6F73B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_bh622_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92DB30C1-EADF-46E3-BD20-BD56276C15BC",
              "versionEndIncluding": "v100r002c00spc110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_bh622_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE679709-C018-4985-BA9D-299FDF076722",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_bh640_v2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "825F650D-98CC-48E7-829F-9C629CEBB85A",
              "versionEndIncluding": "v100r002c00spc108",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_bh640_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B5208A2-6618-4BD8-941E-72C6E0EFA613",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_ch121_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EB46DC-6483-403B-8966-EA5586E1FB5A",
              "versionEndIncluding": "v100r001c00spc180",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_ch121:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F9852D2-9810-435E-A3D2-350B618E43C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_ch140_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "218FA162-4BEA-4F0A-B379-BF9EC6301996",
              "versionEndIncluding": "v100r001c00spc110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_ch140:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "547A85D0-351C-45EE-82F2-C2DE5B525B6E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_ch220_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2563C24-E47B-4951-863E-3C19C078D12B",
              "versionEndIncluding": "v100r001c00spc180",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_ch220:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC3A7B78-636C-406E-B9DC-D3890E35DA00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_ch221_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA7EB8FF-FCD5-447D-A6B8-937D052549BE",
              "versionEndIncluding": "v100r001c00spc180",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_ch221:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB64F47B-46ED-4A64-A145-C7DA8B20DF09",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_ch222_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FB27783-7F45-44CC-B1C6-DBA12A0FE819",
              "versionEndIncluding": "v100r002c00spc180",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_ch222:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E54AC65E-109B-46C0-9612-0B2C37FFACA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_ch240_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B82E68F-50F9-4954-BC45-2006B10717EF",
              "versionEndIncluding": "v100r001c00spc180",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_ch240:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B67CF03-803B-45BF-A251-9202AD90790E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_ch242_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E29BDA-6B37-4AAE-BFAC-78975F59BEB3",
              "versionEndIncluding": "v100r001c00spc180",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_ch242:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD72540-1168-44E6-9A69-8153921285B4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tecal_ch242_v3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48181547-FDB6-4087-AF83-856574EBCCA3",
              "versionEndIncluding": "v100r001c00spc110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tecal_ch242_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD042F78-D7CE-48CE-AA9A-0D55C1492ABB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions have a CSRF vulnerability. The products do not use the Token mechanism for web access control. When users log in to the Huawei servers and access websites containing the malicious CSRF script, the CSRF script is executed, which may cause configuration tampering and system restart."
    },
    {
      "lang": "es",
      "value": "Huawei Tecal RH1288 V2 V100R002C00SPC107 y versiones anteriores, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 y versiones anteriores, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 y versiones anteriores, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 y versiones anteriores, Tecal RH2288H V2 V100R002C00SPC115 y versiones anteriores, Tecal RH2485 V2 V100R002C00SPC502 y versiones anteriores, Tecal RH5885 V2 V100R001C02SPC109 y versiones anteriores, Tecal RH5885 V3 V100R003C01SPC102 y versiones anteriores, Tecal RH5885H V3 V100R003C00SPC102 y versiones anteriores, Tecal XH310 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH311 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH320 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH621 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH310 V2 V100R001C00SPC110 y versiones anteriores, Tecal DH320 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH620 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH621 V2 V100R001C00SPC107 y versiones anteriores, Tecal DH628 V2 V100R001C00SPC107 y versiones anteriores, Tecal BH620 V2 V100R002C00SPC107 y versiones anteriores, Tecal BH621 V2 V100R002C00SPC106 y versiones anteriores, Tecal BH622 V2 V100R002C00SPC110 y versiones anteriores, Tecal BH640 V2 V100R002C00SPC108 y versiones anteriores, Tecal CH121 V100R001C00SPC180 y versiones anteriores, Tecal CH140 V100R001C00SPC110 y versiones anteriores, Tecal CH220 V100R001C00SPC180 y versiones anteriores, Tecal CH221 V100R001C00SPC180 y versiones anteriores, Tecal CH222 V100R002C00SPC180 y versiones anteriores, Tecal CH240 V100R001C00SPC180 y versiones anteriores, Tecal CH242 V100R001C00SPC180 y versiones anteriores, Tecal CH242 V3 V100R001C00SPC110 y versiones anteriores tienen una vulnerabilidad de CSRF. Los productos no utilizan el mecanismo Token para el control de acceso web. Cuando los usuarios inician sesi\u00f3n en los servidores Huawei y acceden a los sitios web que contiene la secuencias de comandos CSRF malicioso, se ejecuta la secuencia de comandos CSRF, lo que puede causar manipulaci\u00f3n de la configuraci\u00f3n y reinicio del sistema."
    }
  ],
  "id": "CVE-2014-9694",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-04-02T20:59:00.627",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/hw-408100"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/hw-408100"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…