Page 2 of 20 results (0.016 seconds)

CVSS: 6.5EPSS: 0%CPEs: 26EXPL: 0

There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00. Se presenta una vulnerabilidad de lectura fuera de límites en varios productos. • https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en • CWE-125: Out-of-bounds Read •

CVSS: 6.5EPSS: 0%CPEs: 14EXPL: 0

There is an out-of-bounds read vulnerability in some versions of NIP6800, Secospace USG6600 and USG9500. The software reads data past the end of the intended buffer when parsing DHCP messages including crafted parameter. Successful exploit could cause certain service abnormal. Se presenta una vulnerabilidad de lectura fuera de límites en algunas versiones de NIP6800, Secospace USG6600 y USG9500. El software lee los datos más allá del final del búfer previsto cuando se analizan los mensajes DHCP, incluyendo el parámetro diseñado. • https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en • CWE-125: Out-of-bounds Read •

CVSS: 6.5EPSS: 0%CPEs: 26EXPL: 0

There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10 Se presenta una vulnerabilidad de escritura fuera de límites en algunos productos. Un atacante no autenticado diseña paquetes malformados con parámetros específicos y envía los paquetes a los productos afectados. • https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 89EXPL: 0

Huawei products IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 with versions of V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30 have an improper authentication vulnerability. Attackers need to perform some operations to exploit the vulnerability. Successful exploit may obtain certain permissions on the device. Los productos Huawei IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 con versiones de V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30, presenta una vulnerabilidad de autenticación inapropiada. Los atacantes necesitan llevar a cabo algunas operaciones para explotar la vulnerabilidad. • https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en • CWE-287: Improper Authentication •

CVSS: 4.9EPSS: 0%CPEs: 14EXPL: 0

NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when administrator log in to the device and performs some operations. Successful exploit could cause certain process reboot. NIP6800; Secospace USG6600; USG9500 con versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100, presentan una vulnerabilidad de acceso de puntero no válido. El sistema del software accede a un puntero no válido cuando el administrador inicia sesión en el dispositivo y lleva a cabo algunas operaciones. • https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en • CWE-824: Access of Uninitialized Pointer •