VAR-201609-0566

Vulnerability from variot - Updated: 2025-04-13 23:25

Huawei XH620 V3, XH622 V3, and XH628 V3 servers with software before V100R003C00SPC610, RH1288 V3 servers with software before V100R003C00SPC613, RH2288 V3 servers with software before V100R003C00SPC617, and RH2288H V3 servers with software before V100R003C00SPC515 allow remote attackers to obtain passwords via a brute-force attack, related to "lack of authentication protection mechanisms.". plural Huawei Product software includes " Missing authentication protection mechanism " There is a vulnerability in password acquisition due to incomplete processing. Supplementary information : CWE Vulnerability type by CWE-285: Improper Authorization ( Inappropriate authentication ) Has been identified. http://cwe.mitre.org/data/definitions/285.htmlRound robin by a third party (brute-force) A password may be obtained through an attack. Huawei is a Chinese provider of information and communication solutions. An authentication bypass vulnerability exists in multiple Huawei servers, and an attacker can exploit this vulnerability to bypass the authentication mechanism. Huawei XH628 and others are all servers of China Huawei (Huawei). There are brute force cracking attack vulnerabilities in several Huawei servers. A remote attacker could exploit this vulnerability to obtain passwords through a brute force attack. The following products and versions are affected: Huawei XH620 V3, XH622 V3, XH628 V3 earlier than V100R003C00SPC610, RH1288 V3 earlier than V100R003C00SPC613, RH2288 V3 earlier than V100R003C00SPC617, and RH2288H V3 earlier than V100R003C

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0566",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "xh628 v3 server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "rh2288 v3 server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "xh622 v3 server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "rh1288 v3 server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "rh2288h v3 server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "xh620 v3 server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "rh1288 v100r003c00",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh2288 v100r003c00",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh2288h v100r003c00",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "xh620 v100r003c00",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "xh622 v100r003c00",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "xh628 v100r003c00",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh1288 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rh1288 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc613"
      },
      {
        "model": "rh2288 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rh2288 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc617"
      },
      {
        "model": "rh2288h v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rh2288h v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc515"
      },
      {
        "model": "xh620 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "xh620 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc610"
      },
      {
        "model": "xh622 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "xh622 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc610"
      },
      {
        "model": "xh628 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "xh628 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc610"
      },
      {
        "model": "rh5885 v100r003c01",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "ch242 v100r001c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "xh628 v100r003c00spc610",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "xh622 v100r003c00spc610",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "xh620 v100r003c00spc610",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh2288h v100r003c00spc515",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh2288 v100r003c00spc617",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh1288 v100r003c00spc613",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "v3"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06460"
      },
      {
        "db": "BID",
        "id": "92504"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004561"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-326"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6825"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:huawei:rh1288_v3_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:rh1288_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:rh2288_v3_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:rh2288_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:rh2288h_v3_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:rh2288h_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:xh620_v3_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:xh620_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:xh622_v3_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:xh622_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:xh628_v3_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:xh628_v3_server_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004561"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "92504"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-6825",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2016-6825",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-06460",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-95645",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2016-6825",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-6825",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-6825",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-06460",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201608-326",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-95645",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06460"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95645"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004561"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-326"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6825"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei XH620 V3, XH622 V3, and XH628 V3 servers with software before V100R003C00SPC610, RH1288 V3 servers with software before V100R003C00SPC613, RH2288 V3 servers with software before V100R003C00SPC617, and RH2288H V3 servers with software before V100R003C00SPC515 allow remote attackers to obtain passwords via a brute-force attack, related to \"lack of authentication protection mechanisms.\". plural Huawei Product software includes \" Missing authentication protection mechanism \" There is a vulnerability in password acquisition due to incomplete processing. Supplementary information : CWE Vulnerability type by CWE-285: Improper Authorization ( Inappropriate authentication ) Has been identified. http://cwe.mitre.org/data/definitions/285.htmlRound robin by a third party (brute-force) A password may be obtained through an attack. Huawei is a Chinese provider of information and communication solutions. An authentication bypass vulnerability exists in multiple Huawei servers, and an attacker can exploit this vulnerability to bypass the authentication mechanism. Huawei XH628 and others are all servers of China Huawei (Huawei). There are brute force cracking attack vulnerabilities in several Huawei servers. A remote attacker could exploit this vulnerability to obtain passwords through a brute force attack. The following products and versions are affected: Huawei XH620 V3, XH622 V3, XH628 V3 earlier than V100R003C00SPC610, RH1288 V3 earlier than V100R003C00SPC613, RH2288 V3 earlier than V100R003C00SPC617, and RH2288H V3 earlier than V100R003C",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-6825"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004561"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-06460"
      },
      {
        "db": "BID",
        "id": "92504"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95645"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-6825",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "92504",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004561",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-326",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-06460",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "34589",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-95645",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06460"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95645"
      },
      {
        "db": "BID",
        "id": "92504"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004561"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-326"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6825"
      }
    ]
  },
  "id": "VAR-201609-0566",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06460"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95645"
      }
    ],
    "trust": 1.4653273749999998
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06460"
      }
    ]
  },
  "last_update_date": "2025-04-13T23:25:08.596000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20160817-01-server",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160817-01-server-en"
      },
      {
        "title": "Multiple Huawei server authentication bypass vulnerability patches",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/80577"
      },
      {
        "title": "Multiple Huawei Product brute force cracking repair measures",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63693"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06460"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004561"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-326"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-285",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95645"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004561"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6825"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/92504"
      },
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160817-01-server-en"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6825"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6825"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/34589"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20160817-01-server-en"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06460"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95645"
      },
      {
        "db": "BID",
        "id": "92504"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004561"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-326"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6825"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06460"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95645"
      },
      {
        "db": "BID",
        "id": "92504"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004561"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-326"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6825"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-08-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-06460"
      },
      {
        "date": "2016-09-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95645"
      },
      {
        "date": "2016-08-17T00:00:00",
        "db": "BID",
        "id": "92504"
      },
      {
        "date": "2016-09-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004561"
      },
      {
        "date": "2016-08-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201608-326"
      },
      {
        "date": "2016-09-07T19:28:14.503000",
        "db": "NVD",
        "id": "CVE-2016-6825"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-01-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-06460"
      },
      {
        "date": "2016-09-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95645"
      },
      {
        "date": "2016-08-17T00:00:00",
        "db": "BID",
        "id": "92504"
      },
      {
        "date": "2016-09-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004561"
      },
      {
        "date": "2016-09-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201608-326"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2016-6825"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-326"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Vulnerability in obtaining password in product software",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004561"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-326"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…