VAR-201609-0562
Vulnerability from variot - Updated: 2025-04-13 23:36The Intelligent Baseboard Management Controller (iBMC) in Huawei RH1288 V3 servers with software before V100R003C00SPC613; RH2288 V3 servers with software before V100R003C00SPC617; RH2288H V3 servers with software before V100R003C00SPC515; RH5885 V3 servers with software before V100R003C10SPC102; and XH620 V3, XH622 V3, and XH628 V3 servers with software before V100R003C00SPC610 allows local users to cause a denial of service (iBMC resource consumption) via unspecified vectors. plural Huawei Product Intelligent Baseboard Management Controller (iBMC) The denial of service (iBMC Resource consumption ) There is a vulnerability that can be exploited.Denial of service by local user (iBMC Resource consumption ) May be in a state. Multiple Huawei Servers are prone to a local denial-of-service vulnerability. A local attacker can exploit this issue to cause a denial-of-service condition. Intelligent Baseboard Management Controller (iBMC) is one of the software used to manage the server control unit. There are resource management vulnerabilities in the iBMC of various Huawei servers. The following products and versions are affected: Huawei RH1288 V3 V100R003C00SPC613 previous version, RH2288 V3 V100R003C00SPC617 previous version, RH2288H V3 V100R003C00SPC515 previous version, RH5885 V3 V100R003C10SPC102 previous version, XH620 V3 , XH622 V3 , XH628 V3 V100R003C00SPC610 previous version
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201609-0562",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "xh628 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "rh5885 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r003c01"
},
{
"model": "rh2288 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "xh622 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "rh1288 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "rh2288h v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "xh620 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "rh1288 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "rh1288 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00spc613"
},
{
"model": "rh2288 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "rh2288 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00spc617"
},
{
"model": "rh2288h v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "rh2288h v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00spc515"
},
{
"model": "rh5885 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "rh5885 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c10spc102"
},
{
"model": "xh620 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "xh620 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00spc610"
},
{
"model": "xh622 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "xh622 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00spc610"
},
{
"model": "xh628 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "xh628 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00spc610"
},
{
"model": "xh628 v100r003c00",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "xh622 v100r003c00",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "xh620 v100r003c00",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "rh5885 v100r003c01",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "rh2288h v100r003c00",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "rh2288 v100r003c00",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "rh1288 v100r003c00",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "xh628 v100r003c00spc610",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "xh622 v100r003c00spc610",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "xh620 v100r003c00spc610",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "rh5885 v100r003c10spc102",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "rh2288h v100r003c00spc515",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "rh2288 v100r003c00spc617",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "rh1288 v100r003c00spc613",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
}
],
"sources": [
{
"db": "BID",
"id": "92909"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004566"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-104"
},
{
"db": "NVD",
"id": "CVE-2016-6900"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:rh1288_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:rh1288_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:rh2288_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:rh2288_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:rh2288h_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:rh2288h_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:rh5885_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:rh5885_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:xh620_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:xh620_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:xh622_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:xh622_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:xh628_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:xh628_v3_server_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004566"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported the issue.",
"sources": [
{
"db": "BID",
"id": "92909"
}
],
"trust": 0.3
},
"cve": "CVE-2016-6900",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2016-6900",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "VHN-95720",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.8,
"id": "CVE-2016-6900",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-6900",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2016-6900",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201609-104",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-95720",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-95720"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004566"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-104"
},
{
"db": "NVD",
"id": "CVE-2016-6900"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Intelligent Baseboard Management Controller (iBMC) in Huawei RH1288 V3 servers with software before V100R003C00SPC613; RH2288 V3 servers with software before V100R003C00SPC617; RH2288H V3 servers with software before V100R003C00SPC515; RH5885 V3 servers with software before V100R003C10SPC102; and XH620 V3, XH622 V3, and XH628 V3 servers with software before V100R003C00SPC610 allows local users to cause a denial of service (iBMC resource consumption) via unspecified vectors. plural Huawei Product Intelligent Baseboard Management Controller (iBMC) The denial of service (iBMC Resource consumption ) There is a vulnerability that can be exploited.Denial of service by local user (iBMC Resource consumption ) May be in a state. Multiple Huawei Servers are prone to a local denial-of-service vulnerability. \nA local attacker can exploit this issue to cause a denial-of-service condition. Intelligent Baseboard Management Controller (iBMC) is one of the software used to manage the server control unit. There are resource management vulnerabilities in the iBMC of various Huawei servers. The following products and versions are affected: Huawei RH1288 V3 V100R003C00SPC613 previous version, RH2288 V3 V100R003C00SPC617 previous version, RH2288H V3 V100R003C00SPC515 previous version, RH5885 V3 V100R003C10SPC102 previous version, XH620 V3 , XH622 V3 , XH628 V3 V100R003C00SPC610 previous version",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-6900"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004566"
},
{
"db": "BID",
"id": "92909"
},
{
"db": "VULHUB",
"id": "VHN-95720"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-6900",
"trust": 2.8
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004566",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201609-104",
"trust": 0.7
},
{
"db": "BID",
"id": "92909",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-95720",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-95720"
},
{
"db": "BID",
"id": "92909"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004566"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-104"
},
{
"db": "NVD",
"id": "CVE-2016-6900"
}
]
},
"id": "VAR-201609-0562",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-95720"
}
],
"trust": 0.8318027142857142
},
"last_update_date": "2025-04-13T23:36:24.139000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160824-01-server",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-server-en"
},
{
"title": "Multiple Huawei server Intelligent Baseboard Management Controller Remediation measures for resource management vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63927"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004566"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-104"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-95720"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004566"
},
{
"db": "NVD",
"id": "CVE-2016-6900"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-server-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6900"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6900"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-95720"
},
{
"db": "BID",
"id": "92909"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004566"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-104"
},
{
"db": "NVD",
"id": "CVE-2016-6900"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-95720"
},
{
"db": "BID",
"id": "92909"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004566"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-104"
},
{
"db": "NVD",
"id": "CVE-2016-6900"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-07T00:00:00",
"db": "VULHUB",
"id": "VHN-95720"
},
{
"date": "2016-08-24T00:00:00",
"db": "BID",
"id": "92909"
},
{
"date": "2016-09-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004566"
},
{
"date": "2016-09-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-104"
},
{
"date": "2016-09-07T19:28:21.740000",
"db": "NVD",
"id": "CVE-2016-6900"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-08T00:00:00",
"db": "VULHUB",
"id": "VHN-95720"
},
{
"date": "2016-08-24T00:00:00",
"db": "BID",
"id": "92909"
},
{
"date": "2016-09-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004566"
},
{
"date": "2016-09-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-104"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-6900"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "92909"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-104"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Product Intelligent Baseboard Management Controller Denial of service in Japan (DoS) Vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004566"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201609-104"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.