CVE-2016-6178
https://notcve.org/view.php?id=CVE-2016-6178
Huawei NE40E and CX600 devices with software before V800R007SPH017; PTN 6900-2-M8 devices with software before V800R007SPH019; NE5000E devices with software before V800R006SPH018; and CloudEngine devices 12800 with software before V100R003SPH010 and V100R005 before V100R005SPH006 allow remote attackers with control plane access to cause a denial of service or execute arbitrary code via a crafted packet. Dispositivos Huawei NE40E y CX600 con software en versiones anteriores a V800R007SPH017; dispositivos PTN 6900-2-M8 con software en versiones anteriores V800R007SPH019; dispositivos NE5000E con software en versiones anteriores a V800R006SPH018 y dispositivos CloudEngine 12800 con software en versiones anteriores a V100R003SPH010 y V100R005 en versiones anteriores a V100R005SPH006 permiten a atacantes remotos con acceso plano de control provocar una denegación de servicio o ejecutar código arbitrario a través de un paquete manipulado. • http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160713-01-multicast-ldp-fec-stack-en http://www.securityfocus.com/bid/91772 • CWE-20: Improper Input Validation •
CVE-2012-4960 – Huawei (Multiple Products) - Password Encryption
https://notcve.org/view.php?id=CVE-2012-4960
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Los Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, y NIP5100 utiliza el algoritmo DES para las contraseñas almacenados, lo que hace que sea más fácil para los atacantes dependientes de contexto obtener contraseñas de texto simple a través de un ataque de fuerza bruta. • https://www.exploit-db.com/exploits/38020 http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm http://www.kb.cert.org/vuls/id/948096 • CWE-310: Cryptographic Issues •
CVE-2012-3268
https://notcve.org/view.php?id=CVE-2012-3268
Certain HP Access Controller, Fabric Module, Firewall, Router, Switch, and UTM Appliance products; certain HP 3Com Access Controller, Router, and Switch products; certain HP H3C Access Controller, Firewall, Router, Switch, and Switch and Route Processing Unit products; and certain Huawei Firewall/Gateway, Router, Switch, and Wireless products do not properly implement access control as defined in h3c-user.mib 2.0 and hh3c-user.mib 2.0, which allows remote authenticated users to discover credentials in UserInfoEntry values via an SNMP request with the read-only community. Determinados HP Access Controller, Fabric Module, Firewall, Router, Switch, y productos UTM Appliance; algunos productos HP 3Com Access Controller, Router, Switch; algunos HP H3C Access Controller, Firewall, Router, Switch, y Switch y Route Processing Unit ; y determinados productos Huawei Firewall/Gateway, Router, Switch, y Wireless no implementan un control de acceso adecuado definido en defined en h3c-user.mib 2.0 y hh3c-user.mib 2.0, lo que permite a usuarios autenticados remotamente descubrir credenciales en los valores de UserInfoEntry a través de peticiones SNMP con la comunidad "read-only". • http://archives.neohapsis.com/archives/bugtraq/2012-10/0123.html http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685 http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301&contentId=NEWS1000001165&idAbsPath=0301_10001&nameAbsPath=Services%2520News http://support.huawei.com/support/pages/news/NewsInfoAction.do?doc_id=IN0000054930&colID=ROOTENWEB%7CCO0000000170&actionFlag=view http://www.kb.cert.org • CWE-522: Insufficiently Protected Credentials •