VAR-201609-0561

Vulnerability from variot - Updated: 2025-04-13 23:41

The Intelligent Baseboard Management Controller (iBMC) in Huawei RH1288 V3 servers with software before V100R003C00SPC613, RH2288 V3 servers with software before V100R003C00SPC617, RH2288H V3 servers with software before V100R003C00SPC515, RH5885 V3 servers with software before V100R003C10SPC102, and XH620 V3, XH622 V3, and XH628 V3 servers with software before V100R003C00SPC610 might allow remote attackers to decrypt encrypted data and consequently obtain sensitive information by leveraging selection of an insecure SSL encryption algorithm. plural Huawei Product Intelligent Baseboard Management Controller (iBMC) Contains a vulnerability that can decrypt encrypted data and, as a result, retrieve important information.Unsafe by a third party SSL By using the choice of encryption algorithm, the encrypted data can be decrypted and as a result, important information can be obtained. HuaweiRH1288 and other servers are Huawei's servers in China. An insecure encryption algorithm vulnerability exists in several Huawei products. A remote attacker can exploit this vulnerability to obtain sensitive information. Huawei Servers are prone to a security weakness. The following products and versions are affected: The following products and versions are affected: Huawei RH1288 V3 V100R003C00SPC613 previous version, RH2288 V3 V100R003C00SPC617 previous version, RH2288H V3 V100R003C00SPC515 previous version, RH5885 V3 V100R003C10SPC102 previous version, XH620 V3 , XH622 V3 , XH628 Versions earlier than V3 V100R003C00SPC610

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0561",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "xh628 v3 server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "rh5885 v3 server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c01"
      },
      {
        "model": "rh2288 v3 server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "xh622 v3 server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "rh1288 v3 server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "rh2288h v3 server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "xh620 v3 server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "rh1288 v100r003c00",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh2288 v100r003c00",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh2288h v100r003c00",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "xh620 v100r003c00",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "xh622 v100r003c00",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "xh628 v100r003c00",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh5885 v100r003c01",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh1288 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rh1288 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc613"
      },
      {
        "model": "rh2288 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rh2288 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc617"
      },
      {
        "model": "rh2288h v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rh2288h v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc515"
      },
      {
        "model": "rh5885 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rh5885 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c10spc102"
      },
      {
        "model": "xh620 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "xh620 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc610"
      },
      {
        "model": "xh622 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "xh622 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc610"
      },
      {
        "model": "xh628 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "xh628 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc610"
      },
      {
        "model": "xh628 v100r003c00spc610",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "xh622 v100r003c00spc610",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "xh620 v100r003c00spc610",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh5885 v100r003c10spc102",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh2288h v100r003c00spc515",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh2288 v100r003c00spc617",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh1288 v100r003c00spc613",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "v3"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06758"
      },
      {
        "db": "BID",
        "id": "92623"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004565"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-452"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6899"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:huawei:rh1288_v3_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:rh1288_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:rh2288_v3_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:rh2288_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:rh2288h_v3_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:rh2288h_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:rh5885_v3_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:rh5885_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:xh620_v3_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:xh620_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:xh622_v3_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:xh622_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:xh628_v3_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:xh628_v3_server_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004565"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "92623"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-6899",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2016-6899",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2016-06758",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-95719",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2016-6899",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-6899",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-6899",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-06758",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201608-452",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-95719",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06758"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95719"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004565"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-452"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6899"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Intelligent Baseboard Management Controller (iBMC) in Huawei RH1288 V3 servers with software before V100R003C00SPC613, RH2288 V3 servers with software before V100R003C00SPC617, RH2288H V3 servers with software before V100R003C00SPC515, RH5885 V3 servers with software before V100R003C10SPC102, and XH620 V3, XH622 V3, and XH628 V3 servers with software before V100R003C00SPC610 might allow remote attackers to decrypt encrypted data and consequently obtain sensitive information by leveraging selection of an insecure SSL encryption algorithm. plural Huawei Product Intelligent Baseboard Management Controller (iBMC) Contains a vulnerability that can decrypt encrypted data and, as a result, retrieve important information.Unsafe by a third party SSL By using the choice of encryption algorithm, the encrypted data can be decrypted and as a result, important information can be obtained. HuaweiRH1288 and other servers are Huawei\u0027s servers in China. An insecure encryption algorithm vulnerability exists in several Huawei products. A remote attacker can exploit this vulnerability to obtain sensitive information. Huawei Servers are prone to a security weakness. The following products and versions are affected: The following products and versions are affected: Huawei RH1288 V3 V100R003C00SPC613 previous version, RH2288 V3 V100R003C00SPC617 previous version, RH2288H V3 V100R003C00SPC515 previous version, RH5885 V3 V100R003C10SPC102 previous version, XH620 V3 , XH622 V3 , XH628 Versions earlier than V3 V100R003C00SPC610",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-6899"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004565"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-06758"
      },
      {
        "db": "BID",
        "id": "92623"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95719"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-6899",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "92623",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004565",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-452",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-06758",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-95719",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06758"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95719"
      },
      {
        "db": "BID",
        "id": "92623"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004565"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-452"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6899"
      }
    ]
  },
  "id": "VAR-201609-0561",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06758"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95719"
      }
    ],
    "trust": 1.4318027142857142
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06758"
      }
    ]
  },
  "last_update_date": "2025-04-13T23:41:17.039000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20160824-02-server",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-02-server-en"
      },
      {
        "title": "Patches for multiple Huawei product insecure encryption algorithm vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/80772"
      },
      {
        "title": "Multiple Huawei Repair measures for product insecure encryption algorithm vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63775"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06758"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004565"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-452"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-310",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95719"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004565"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6899"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/92623"
      },
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-02-server-en"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6899"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6899"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20160824-02-server-en"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06758"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95719"
      },
      {
        "db": "BID",
        "id": "92623"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004565"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-452"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6899"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06758"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95719"
      },
      {
        "db": "BID",
        "id": "92623"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004565"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-452"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6899"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-08-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-06758"
      },
      {
        "date": "2016-09-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95719"
      },
      {
        "date": "2016-08-24T00:00:00",
        "db": "BID",
        "id": "92623"
      },
      {
        "date": "2016-09-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004565"
      },
      {
        "date": "2016-08-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201608-452"
      },
      {
        "date": "2016-09-07T19:28:20.443000",
        "db": "NVD",
        "id": "CVE-2016-6899"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-08-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-06758"
      },
      {
        "date": "2016-09-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95719"
      },
      {
        "date": "2016-08-24T00:00:00",
        "db": "BID",
        "id": "92623"
      },
      {
        "date": "2016-09-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004565"
      },
      {
        "date": "2016-09-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201608-452"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2016-6899"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-452"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Product  Intelligent Baseboard Management Controller Vulnerable to decrypting encrypted data",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004565"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-452"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…