VAR-201609-0583
Vulnerability from variot - Updated: 2025-04-13 23:21Huawei X6800 and XH620 V3 servers with software before V100R003C00SPC606, RH1288 V3 servers with software before V100R003C00SPC613, RH2288 V3 servers with software before V100R003C00SPC617, CH140 V3 and CH226 V3 servers with software before V100R001C00SPC122, CH220 V3 servers with software before V100R001C00SPC201, and CH121 V3 and CH222 V3 servers with software before V100R001C00SPC202 might allow remote attackers to decrypt encrypted data and consequently obtain sensitive information by leveraging selection of an insecure SSH encryption algorithm. plural Huawei Server software contains a vulnerability that can decrypt encrypted data and, as a result, retrieve important information.Insecure by third parties SSH By choosing an encryption algorithm, you may be able to decrypt the encrypted data and thereby obtain important information. The Huawei XH620 and X6800 are both server products of China's Huawei company. An information disclosure vulnerability exists in the HuaweiXH620 and X6800 that allows an attacker to exploit the vulnerability to obtain sensitive information or to initiate further attacks. Multiple Huawei Products are prone to an information-disclosure vulnerability. The following products and versions are affected: Huawei X6800 and H620 V3 V100R003C00SPC606 previous version, RH1288 V3 V100R003C00SPC613 previous version, RH2288 V3 V100R003C00SPC617 previous version, CH140 V3 and CH226 V3 V100R001C00SPC122 previous version, CH220 V3 V100R001C00SPC201 previous version, CH121 V3 and versions earlier than CH222 V3 V100R001C00SPC202
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201609-0583",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ch140 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"model": "x6800 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "ch220 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"model": "rh2288 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "ch121 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"model": "rh1288 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "ch226 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"model": "xh620 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "ch222 v3 server",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"model": "xh620 v100r003c00",
"scope": "eq",
"trust": 0.9,
"vendor": "huawei",
"version": "v3"
},
{
"model": "v100r003c00",
"scope": "eq",
"trust": 0.9,
"vendor": "huawei",
"version": "x6800"
},
{
"model": "ch121 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ch121 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r001c00spc202"
},
{
"model": "ch140 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ch140 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r001c00spc122"
},
{
"model": "ch220 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ch220 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r001c00spc201"
},
{
"model": "ch222 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ch222 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r001c00spc202"
},
{
"model": "ch226 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ch226 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r001c00spc122"
},
{
"model": "rh1288 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "rh1288 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00spc613"
},
{
"model": "rh2288 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "rh2288 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00spc617"
},
{
"model": "x6800",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "x6800",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00spc606"
},
{
"model": "xh620 v3",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "xh620 v3",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00spc606"
},
{
"model": "xh620 v100r003c00spc606",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "v3"
},
{
"model": "v100r003c00spc606",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "x6800"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-07154"
},
{
"db": "BID",
"id": "92503"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004580"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-531"
},
{
"db": "NVD",
"id": "CVE-2016-6838"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:ch121_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ch121_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ch140_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ch140_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ch220_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ch220_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ch222_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ch222_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ch226_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ch226_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:rh1288_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:rh1288_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:rh2288_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:rh2288_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:x6800_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:x6800_v3_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:xh620_v3_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:xh620_v3_server_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004580"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported the issue.",
"sources": [
{
"db": "BID",
"id": "92503"
}
],
"trust": 0.3
},
"cve": "CVE-2016-6838",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2016-6838",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-07154",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-95658",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2016-6838",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-6838",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2016-6838",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2016-07154",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201608-531",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-95658",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-07154"
},
{
"db": "VULHUB",
"id": "VHN-95658"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004580"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-531"
},
{
"db": "NVD",
"id": "CVE-2016-6838"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei X6800 and XH620 V3 servers with software before V100R003C00SPC606, RH1288 V3 servers with software before V100R003C00SPC613, RH2288 V3 servers with software before V100R003C00SPC617, CH140 V3 and CH226 V3 servers with software before V100R001C00SPC122, CH220 V3 servers with software before V100R001C00SPC201, and CH121 V3 and CH222 V3 servers with software before V100R001C00SPC202 might allow remote attackers to decrypt encrypted data and consequently obtain sensitive information by leveraging selection of an insecure SSH encryption algorithm. plural Huawei Server software contains a vulnerability that can decrypt encrypted data and, as a result, retrieve important information.Insecure by third parties SSH By choosing an encryption algorithm, you may be able to decrypt the encrypted data and thereby obtain important information. The Huawei XH620 and X6800 are both server products of China\u0027s Huawei company. An information disclosure vulnerability exists in the HuaweiXH620 and X6800 that allows an attacker to exploit the vulnerability to obtain sensitive information or to initiate further attacks. Multiple Huawei Products are prone to an information-disclosure vulnerability. The following products and versions are affected: Huawei X6800 and H620 V3 V100R003C00SPC606 previous version, RH1288 V3 V100R003C00SPC613 previous version, RH2288 V3 V100R003C00SPC617 previous version, CH140 V3 and CH226 V3 V100R001C00SPC122 previous version, CH220 V3 V100R001C00SPC201 previous version, CH121 V3 and versions earlier than CH222 V3 V100R001C00SPC202",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-6838"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004580"
},
{
"db": "CNVD",
"id": "CNVD-2016-07154"
},
{
"db": "BID",
"id": "92503"
},
{
"db": "VULHUB",
"id": "VHN-95658"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-6838",
"trust": 3.4
},
{
"db": "BID",
"id": "92503",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004580",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201608-531",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-07154",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-95658",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-07154"
},
{
"db": "VULHUB",
"id": "VHN-95658"
},
{
"db": "BID",
"id": "92503"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004580"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-531"
},
{
"db": "NVD",
"id": "CVE-2016-6838"
}
]
},
"id": "VAR-201609-0583",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-07154"
},
{
"db": "VULHUB",
"id": "VHN-95658"
}
],
"trust": 1.49166665
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-07154"
}
]
},
"last_update_date": "2025-04-13T23:21:05.945000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160817-02-server",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160817-02-server-en"
},
{
"title": "Patches for multiple Huawei product information disclosure vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/81095"
},
{
"title": "Multiple Huawei Product information disclosure vulnerability repair measures",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63829"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-07154"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004580"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-531"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
},
{
"problemtype": "CWE-310",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-95658"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004580"
},
{
"db": "NVD",
"id": "CVE-2016-6838"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/92503"
},
{
"trust": 1.7,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160817-02-server-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6838"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6838"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20160817-02-server-en"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-07154"
},
{
"db": "VULHUB",
"id": "VHN-95658"
},
{
"db": "BID",
"id": "92503"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004580"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-531"
},
{
"db": "NVD",
"id": "CVE-2016-6838"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-07154"
},
{
"db": "VULHUB",
"id": "VHN-95658"
},
{
"db": "BID",
"id": "92503"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004580"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-531"
},
{
"db": "NVD",
"id": "CVE-2016-6838"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-04T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-07154"
},
{
"date": "2016-09-07T00:00:00",
"db": "VULHUB",
"id": "VHN-95658"
},
{
"date": "2016-08-17T00:00:00",
"db": "BID",
"id": "92503"
},
{
"date": "2016-09-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004580"
},
{
"date": "2016-08-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-531"
},
{
"date": "2016-09-07T19:28:15.537000",
"db": "NVD",
"id": "CVE-2016-6838"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-04T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-07154"
},
{
"date": "2016-09-09T00:00:00",
"db": "VULHUB",
"id": "VHN-95658"
},
{
"date": "2016-08-31T20:00:00",
"db": "BID",
"id": "92503"
},
{
"date": "2016-09-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004580"
},
{
"date": "2016-09-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-531"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-6838"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-531"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Vulnerability in server software to decrypt encrypted data",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004580"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-531"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.