2 results (0.010 seconds)

CVSS: 5.3EPSS: 0%CPEs: 25EXPL: 0

There is a weak algorithm vulnerability in some Huawei products. The affected products use the RSA algorithm in the SSL key exchange algorithm which have been considered as a weak algorithm. Attackers may exploit this vulnerability to leak some information. Existe una vulnerabilidad de algoritmo débil en algunos productos Huawei. Los productos afectados utilizan el algoritmo RSA en el algoritmo de intercambio de claves SSL que se ha considerado como un algoritmo débil. • https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-rsa-en • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 5.9EPSS: 0%CPEs: 87EXPL: 0

Some Huawei products have an insufficient verification of data authenticity vulnerability. A remote, unauthenticated attacker has to intercept specific packets between two devices, modify the packets, and send the modified packets to the peer device. Due to insufficient verification of some fields in the packets, an attacker may exploit the vulnerability to cause the target device to be abnormal. Algunos productos Huawei presentan una comprobación insuficiente de una vulnerabilidad de autenticidad de datos. Un atacante remoto no autenticado tiene que interceptar paquetes específicos entre dos dispositivos, modificar los paquetes y enviar los paquetes modificados hacia el dispositivo peer. • http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-validation-en • CWE-345: Insufficient Verification of Data Authenticity •