Vulnerabilites related to Huawei - WS7200-10
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | hirouter-cd30-10_firmware | * | |
huawei | hirouter-cd30-10 | - | |
huawei | hirouter-ct31-10_firmware | * | |
huawei | hirouter-ct31-10 | - | |
huawei | ws5200-12_firmware | * | |
huawei | ws5200-12 | - | |
huawei | ws5281-10_firmware | * | |
huawei | ws5281-10 | - | |
huawei | ws5800-10_firmware | * | |
huawei | ws5800-10 | - | |
huawei | ws7100-10_firmware | * | |
huawei | ws7100-10 | - | |
huawei | ws7200-10_firmware | * | |
huawei | ws7200-10 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21DAB41B-30DC-4621-9AF0-D60EAB48511B", "versionEndExcluding": "10.0.5.7", "versionStartIncluding": "10.0.2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "593BD59F-41AA-4AEB-8F13-43484BE26E1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-ct31-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86B841D5-A00F-4A94-B90D-3183C33429FB", "versionEndExcluding": "10.0.2.37", "versionStartIncluding": "10.0.2.20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-ct31-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD8A7CD-6AF2-4681-9DED-1A225623FC18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EACB670B-E1DC-4734-9683-D3A732F61A54", "versionEndIncluding": "10.0.5.6", "versionStartIncluding": "10.0.1.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-12:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DE8454-E98B-4AA4-97A9-61DC3BB0E4B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5281-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6855ED3B-FD30-4A51-B748-68A21DDD183D", "versionEndExcluding": "10.0.5.32", "versionStartIncluding": "10.0.5.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5281-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A157FDA-330F-4DF0-AF48-8570B4734D62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FE6EB21-4CBC-4E98-BC81-05A298941727", "versionEndExcluding": "10.0.3.33", "versionStartIncluding": "10.0.3.25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED553DD3-585A-4BD2-9291-B9C09AC6AC40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws7100-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F83A176-A2F9-478C-BFA3-1A637095E88B", "versionEndExcluding": "10.0.5.37", "versionStartIncluding": "10.0.5.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws7100-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "990433C4-F54F-4B50-8972-68F1CF485E1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws7200-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "923DA700-265A-4099-BC3D-E5A44A1D747F", "versionEndExcluding": "10.0.5.37", "versionStartIncluding": "10.0.5.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws7200-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CC813CE-339B-4DB6-9920-D64D185FDDD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21." }, { "lang": "es", "value": "Algunos productos Huawei presentan una vulnerabilidad de verificaci\u00f3n de entrada insuficiente.\u0026#xa0;Los atacantes pueden explotar esta vulnerabilidad en la LAN para causar un servicio anormal en los dispositivos afectados. Las versiones de productos afectados incluyen: HiRouter-CD30-10 versi\u00f3n 10.0.2.5; HiRouter-CT31-10 versi\u00f3n 10.0.2.20; WS5200-12 versi\u00f3n 10.0.1.9; WS5281 -10 versi\u00f3n 10.0.5.10; WS5800-10 versi\u00f3n 10.0.3.25; WS7100-10 versi\u00f3n 10.0.5.21; WS7200-10 versi\u00f3n 10.0.5.21" } ], "id": "CVE-2020-9122", "lastModified": "2024-11-21T05:40:05.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-12T14:15:14.387", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Vendor | Product | Version | |
---|---|---|---|
huawei | ws7200-10_firmware | 11.0.2.13 | |
huawei | ws7200-10 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws7200-10_firmware:11.0.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "3BB7E8B4-6C1C-4977-90D3-72926FABBE0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws7200-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CC813CE-339B-4DB6-9920-D64D185FDDD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a traffic hijacking vulnerability in WS7200-10 11.0.2.13. Successful exploitation of this vulnerability can cause packets to be hijacked by attackers." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de secuestro de tr\u00e1fico en WS7200-10 versi\u00f3n 11.0.2.13. Una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad puede causar el secuestro de paquetes por parte de atacantes" } ], "id": "CVE-2021-46835", "lastModified": "2025-05-28T16:15:21.670", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-09-20T20:15:09.827", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220831-01-5370a6df-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220831-01-5370a6df-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-294" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vendor | Product | Version | |
---|---|---|---|
huawei | ws7200-10_firmware | 11.0.2.13 | |
huawei | ws7200-10 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws7200-10_firmware:11.0.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "3BB7E8B4-6C1C-4977-90D3-72926FABBE0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws7200-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CC813CE-339B-4DB6-9920-D64D185FDDD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a password verification vulnerability in WS7200-10 11.0.2.13. Attackers on the LAN may use brute force cracking to obtain passwords, which may cause sensitive system information to be disclosed." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de verificaci\u00f3n de contrase\u00f1a en WS7200-10 versi\u00f3n 11.0.2.13. Los atacantes en la LAN pueden usar la fuerza bruta para obtener las contrase\u00f1as, lo que puede causar que sea divulgada informaci\u00f3n confidencial del sistema" } ], "id": "CVE-2022-33735", "lastModified": "2025-05-28T16:15:24.063", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-09-20T20:15:09.927", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220628-01-2eda0853-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220628-01-2eda0853-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-307" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-307" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
8.1 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
huawei | tc7001-10_firmware | 2.0.0.336\(sp6c300\) | |
huawei | tc7001-10 | - | |
huawei | ws7200-10_firmware | 3.0.3.215 | |
huawei | ws7200-10 | - | |
huawei | ws7206-10_firmware | 4.0.0.16\(v3r2\) | |
huawei | ws7206-10 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tc7001-10_firmware:2.0.0.336\\(sp6c300\\):*:*:*:*:*:*:*", "matchCriteriaId": "34A51E6B-696A-4275-A1CC-18AD400426DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tc7001-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "291B8DCD-DE45-4834-8F16-2464EB29FD46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws7200-10_firmware:3.0.3.215:*:*:*:*:*:*:*", "matchCriteriaId": "633DC6F0-E031-4278-8E0B-41AE975F7DD1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws7200-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CC813CE-339B-4DB6-9920-D64D185FDDD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws7206-10_firmware:4.0.0.16\\(v3r2\\):*:*:*:*:*:*:*", "matchCriteriaId": "9A6C0416-F770-415C-9013-332A61E4D358", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws7206-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "8153CF45-E1C2-4355-8E99-12B3321A3C28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some Huawei home routers have a connection hijacking vulnerability. Successful exploitation of this vulnerability may cause DoS or information leakage.(Vulnerability ID:HWPSIRT-2023-76605)\nThis vulnerability has been assigned a (CVE)ID:CVE-2023-7266" }, { "lang": "es", "value": "Algunos routeres dom\u00e9sticos de Huawei tienen una vulnerabilidad de secuestro de conexi\u00f3n. La explotaci\u00f3n exitosa de esta vulnerabilidad puede causar ataques de denegaci\u00f3n de servicio (DoS) o fuga de informaci\u00f3n. (ID de vulnerabilidad: HWPSIRT-2023-76605) A esta vulnerabilidad se le ha asignado un ID de vulnerabilidad de seguridad (CVE): CVE-2023-7266" } ], "id": "CVE-2023-7266", "lastModified": "2025-01-13T20:48:22.750", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@huawei.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-12-28T07:15:19.967", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-chvishhr-d616b19e-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-420" } ], "source": "psirt@huawei.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2023-7266 (GCVE-0-2023-7266)
Vulnerability from cvelistv5
- CWE-420 - Unprotected Alternate Channel
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-7266", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-28T16:17:24.290887Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-28T16:18:05.578Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "TC7001-10", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0.336(SP6C300)" } ] }, { "defaultStatus": "unaffected", "product": "WS7200-10", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "WS7200-10-OTA 3.0.3.215-fullpackage(auto_1)" } ] }, { "defaultStatus": "unaffected", "product": "WS7206-10", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "WS7206-10-OTA 4.0.0.16(V3R2)-fullpackage(auto)" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSome Huawei home routers have a connection hijacking vulnerability. Successful exploitation of this vulnerability may cause DoS or information leakage.(Vulnerability ID:HWPSIRT-2023-76605)\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis vulnerability has been assigned a (CVE)ID:CVE-2023-7266\u003c/span\u003e" } ], "value": "Some Huawei home routers have a connection hijacking vulnerability. Successful exploitation of this vulnerability may cause DoS or information leakage.(Vulnerability ID:HWPSIRT-2023-76605)\nThis vulnerability has been assigned a (CVE)ID:CVE-2023-7266" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-420", "description": "CWE-420 Unprotected Alternate Channel", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-28T07:00:51.369Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-chvishhr-d616b19e-en" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-7266", "datePublished": "2024-12-28T07:00:51.369Z", "dateReserved": "2024-06-05T06:02:52.290Z", "dateUpdated": "2024-12-28T16:18:05.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46835 (GCVE-0-2021-46835)
Vulnerability from cvelistv5
- Traffic Hijacking
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220831-01-5370a6df-en | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.928Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220831-01-5370a6df-en" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46835", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-28T15:58:36.289161Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-294", "description": "CWE-294 Authentication Bypass by Capture-replay", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-28T15:59:02.434Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WS7200-10", "vendor": "n/a", "versions": [ { "status": "affected", "version": "11.0.2.13" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a traffic hijacking vulnerability in WS7200-10 11.0.2.13. Successful exploitation of this vulnerability can cause packets to be hijacked by attackers." } ], "problemTypes": [ { "descriptions": [ { "description": "Traffic Hijacking", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-20T19:49:49.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220831-01-5370a6df-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46835", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WS7200-10", "version": { "version_data": [ { "version_value": "11.0.2.13" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a traffic hijacking vulnerability in WS7200-10 11.0.2.13. Successful exploitation of this vulnerability can cause packets to be hijacked by attackers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Traffic Hijacking" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220831-01-5370a6df-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220831-01-5370a6df-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46835", "datePublished": "2022-09-20T19:49:49.000Z", "dateReserved": "2022-08-25T00:00:00.000Z", "dateUpdated": "2025-05-28T15:59:02.434Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-33735 (GCVE-0-2022-33735)
Vulnerability from cvelistv5
- Password Verification
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220628-01-2eda0853-en | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:09:22.657Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220628-01-2eda0853-en" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-33735", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-28T16:01:40.790259Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307 Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-28T16:02:04.978Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WS7200-10", "vendor": "n/a", "versions": [ { "status": "affected", "version": "11.0.2.13" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a password verification vulnerability in WS7200-10 11.0.2.13. Attackers on the LAN may use brute force cracking to obtain passwords, which may cause sensitive system information to be disclosed." } ], "problemTypes": [ { "descriptions": [ { "description": "Password Verification", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-20T19:44:06.000Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220628-01-2eda0853-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-33735", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WS7200-10", "version": { "version_data": [ { "version_value": "11.0.2.13" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a password verification vulnerability in WS7200-10 11.0.2.13. Attackers on the LAN may use brute force cracking to obtain passwords, which may cause sensitive system information to be disclosed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Password Verification" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220628-01-2eda0853-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220628-01-2eda0853-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-33735", "datePublished": "2022-09-20T19:44:06.000Z", "dateReserved": "2022-06-15T00:00:00.000Z", "dateUpdated": "2025-05-28T16:02:04.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-9122 (GCVE-0-2020-9122)
Vulnerability from cvelistv5
- Insufficient Input Verification
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10 |
Version: 10.0.2.5 Version: 10.0.2.20 Version: 10.0.1.9 Version: 10.0.5.10 Version: 10.0.3.25 Version: 10.0.5.21 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10", "vendor": "n/a", "versions": [ { "status": "affected", "version": "10.0.2.5" }, { "status": "affected", "version": "10.0.2.20" }, { "status": "affected", "version": "10.0.1.9" }, { "status": "affected", "version": "10.0.5.10" }, { "status": "affected", "version": "10.0.3.25" }, { "status": "affected", "version": "10.0.5.21" } ] } ], "descriptions": [ { "lang": "en", "value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient Input Verification", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-12T13:37:31", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9122", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10", "version": { "version_data": [ { "version_value": "10.0.2.5" }, { "version_value": "10.0.2.20" }, { "version_value": "10.0.1.9" }, { "version_value": "10.0.5.10" }, { "version_value": "10.0.3.25" }, { "version_value": "10.0.5.21" }, { "version_value": "10.0.5.21" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient Input Verification" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9122", "datePublished": "2020-10-12T13:37:31", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202010-1178
Vulnerability from variot
Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21. plural Huawei The product contains an input verification vulnerability.Denial of service (DoS) It may be put into a state. Huawei HiRouter-CD30-10, etc. are all wireless routers of China's Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202010-1178", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "hirouter-cd30-10", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.5" }, { "model": "ws5281-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.32" }, { "model": "hirouter-cd30-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.7" }, { "model": "ws5200-12", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.6" }, { "model": "ws5200-12", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.1.9" }, { "model": "ws7100-10", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.21" }, { "model": "ws7100-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.37" }, { "model": "ws7200-10", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.21" }, { "model": "ws5800-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.3.33" }, { "model": "ws7200-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.37" }, { "model": "ws5281-10", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.10" }, { "model": "ws5800-10", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.3.25" }, { "model": "hirouter-ct31-10", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.20" }, { "model": "hirouter-ct31-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.37" }, { "model": "hirouter-cd30-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "hirouter-ct31-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws5200-12", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws5281-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws5800-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws7100-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws7200-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "hirouter-ct31-10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.2.20" }, { "model": "ws5800-10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.3.25" }, { "model": "hirouter-cd30-10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.2.5" }, { "model": "ws5200-12", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.1.9" }, { "model": "ws5281-10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.5.10" }, { "model": "ws7100-10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.5.21" }, { "model": "ws7200-10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.5.21" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "NVD", "id": "CVE-2020-9122" } ] }, "cve": "CVE-2020-9122", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2020-9122", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.9, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2020-68353", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2020-9122", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9122", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-9122", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-9122", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-68353", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202009-1682", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-9122", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "VULMON", "id": "CVE-2020-9122" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "CNNVD", "id": "CNNVD-202009-1682" }, { "db": "NVD", "id": "CVE-2020-9122" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21. plural Huawei The product contains an input verification vulnerability.Denial of service (DoS) It may be put into a state. Huawei HiRouter-CD30-10, etc. are all wireless routers of China\u0027s Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2020-9122" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "VULMON", "id": "CVE-2020-9122" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9122", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-012148", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-68353", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202009-1682", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-9122", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "VULMON", "id": "CVE-2020-9122" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "CNNVD", "id": "CNNVD-202009-1682" }, { "db": "NVD", "id": "CVE-2020-9122" } ] }, "id": "VAR-202010-1178", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" } ], "trust": 1.2815476428571428 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" } ] }, "last_update_date": "2024-11-23T21:35:09.319000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20200930-01-verification", "trust": 0.8, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" }, { "title": "Patch for Input verification vulnerabilities in multiple Huawei products (CNVD-2020-68353)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/241531" }, { "title": "HUAWEI Glory routing Pro 2 Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=131161" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "CNNVD", "id": "CNNVD-202009-1682" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "Incorrect input confirmation (CWE-20) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "NVD", "id": "CVE-2020-9122" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9122" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200930-01-verification-cn" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189273" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "VULMON", "id": "CVE-2020-9122" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "CNNVD", "id": "CNNVD-202009-1682" }, { "db": "NVD", "id": "CVE-2020-9122" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "VULMON", "id": "CVE-2020-9122" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "CNNVD", "id": "CNNVD-202009-1682" }, { "db": "NVD", "id": "CVE-2020-9122" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-12-02T00:00:00", "db": "CNVD", "id": "CNVD-2020-68353" }, { "date": "2020-10-12T00:00:00", "db": "VULMON", "id": "CVE-2020-9122" }, { "date": "2021-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "date": "2020-09-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1682" }, { "date": "2020-10-12T14:15:14.387000", "db": "NVD", "id": "CVE-2020-9122" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-12-02T00:00:00", "db": "CNVD", "id": "CNVD-2020-68353" }, { "date": "2020-10-16T00:00:00", "db": "VULMON", "id": "CVE-2020-9122" }, { "date": "2021-04-26T07:54:00", "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "date": "2021-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1682" }, { "date": "2024-11-21T05:40:05.620000", "db": "NVD", "id": "CVE-2020-9122" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-1682" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product input verification vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-012148" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-1682" } ], "trust": 0.6 } }
var-202208-2225
Vulnerability from variot
There is a traffic hijacking vulnerability in WS7200-10 11.0.2.13. Successful exploitation of this vulnerability can cause packets to be hijacked by attackers. Huawei of WS7200-10 There are unspecified vulnerabilities in the firmware.Information may be tampered with. HUAWEI WS7200-10 is a wireless router of China Huawei (HUAWEI).
HUAWEI WS7200-10 has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-2225", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ws7200-10", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.2.13" }, { "model": "ws7200-10", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws7200-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws7200-10", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "ws7200-10 firmware 11.0.2.13" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-81252" }, { "db": "JVNDB", "id": "JVNDB-2022-017685" }, { "db": "NVD", "id": "CVE-2021-46835" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vulnerability was discovered by Huawei internal testers", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-4530" } ], "trust": 0.6 }, "cve": "CVE-2021-46835", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2022-81252", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2021-46835", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46835", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-46835", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-46835", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-81252", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202208-4530", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-81252" }, { "db": "JVNDB", "id": "JVNDB-2022-017685" }, { "db": "CNNVD", "id": "CNNVD-202208-4530" }, { "db": "NVD", "id": "CVE-2021-46835" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a traffic hijacking vulnerability in WS7200-10 11.0.2.13. Successful exploitation of this vulnerability can cause packets to be hijacked by attackers. Huawei of WS7200-10 There are unspecified vulnerabilities in the firmware.Information may be tampered with. HUAWEI WS7200-10 is a wireless router of China Huawei (HUAWEI). \n\r\n\r\nHUAWEI WS7200-10 has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-46835" }, { "db": "JVNDB", "id": "JVNDB-2022-017685" }, { "db": "CNVD", "id": "CNVD-2022-81252" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46835", "trust": 3.8 }, { "db": "JVNDB", "id": "JVNDB-2022-017685", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-81252", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202208-4530", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-81252" }, { "db": "JVNDB", "id": "JVNDB-2022-017685" }, { "db": "CNNVD", "id": "CNNVD-202208-4530" }, { "db": "NVD", "id": "CVE-2021-46835" } ] }, "id": "VAR-202208-2225", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-81252" } ], "trust": 1.2666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-81252" } ] }, "last_update_date": "2024-08-14T15:32:33.431000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei WS7200-10 Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=208407" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-4530" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017685" }, { "db": "NVD", "id": "CVE-2021-46835" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220831-01-5370a6df-en" }, { "trust": 1.2, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20220831-01-5370a6df-cn" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46835" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46835/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-81252" }, { "db": "JVNDB", "id": "JVNDB-2022-017685" }, { "db": "CNNVD", "id": "CNNVD-202208-4530" }, { "db": "NVD", "id": "CVE-2021-46835" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-81252" }, { "db": "JVNDB", "id": "JVNDB-2022-017685" }, { "db": "CNNVD", "id": "CNNVD-202208-4530" }, { "db": "NVD", "id": "CVE-2021-46835" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-25T00:00:00", "db": "CNVD", "id": "CNVD-2022-81252" }, { "date": "2023-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017685" }, { "date": "2022-08-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-4530" }, { "date": "2022-09-20T20:15:09.827000", "db": "NVD", "id": "CVE-2021-46835" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-25T00:00:00", "db": "CNVD", "id": "CNVD-2022-81252" }, { "date": "2023-10-16T06:34:00", "db": "JVNDB", "id": "JVNDB-2022-017685" }, { "date": "2022-09-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-4530" }, { "date": "2022-09-22T14:32:32.677000", "db": "NVD", "id": "CVE-2021-46835" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-4530" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0WS7200-10\u00a0 Firmware vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017685" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-4530" } ], "trust": 0.6 } }
var-202206-2226
Vulnerability from variot
There is a password verification vulnerability in WS7200-10 11.0.2.13. Attackers on the LAN may use brute force cracking to obtain passwords, which may cause sensitive system information to be disclosed. Huawei of WS7200-10 A vulnerability exists in firmware that improperly limits excessive authentication attempts.Information may be obtained. Huawei ws7200-10 is a wireless router of China Huawei (HUAWEI).
Huawei WS7200-10 11.0.2.13 has an access control error vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-2226", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ws7200-10", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.2.13" }, { "model": "ws7200-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws7200-10", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws7200-10", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "ws7200-10 firmware 11.0.2.13" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-01053" }, { "db": "JVNDB", "id": "JVNDB-2022-018968" }, { "db": "NVD", "id": "CVE-2022-33735" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability information provided by Linfeng Xiao(@migraine-sudo) and Lingjuan Tang supply. grateful Linfeng Xiao(@migraine-sudo) and Lingjuan Tang Pay attention to Huawei product vulnerabilities!", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-2763" } ], "trust": 0.6 }, "cve": "CVE-2022-33735", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CNVD-2023-01053", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2022-33735", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-33735", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-33735", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-33735", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2023-01053", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-2763", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-01053" }, { "db": "JVNDB", "id": "JVNDB-2022-018968" }, { "db": "CNNVD", "id": "CNNVD-202206-2763" }, { "db": "NVD", "id": "CVE-2022-33735" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a password verification vulnerability in WS7200-10 11.0.2.13. Attackers on the LAN may use brute force cracking to obtain passwords, which may cause sensitive system information to be disclosed. Huawei of WS7200-10 A vulnerability exists in firmware that improperly limits excessive authentication attempts.Information may be obtained. Huawei ws7200-10 is a wireless router of China Huawei (HUAWEI). \n\r\n\r\nHuawei WS7200-10 11.0.2.13 has an access control error vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2022-33735" }, { "db": "JVNDB", "id": "JVNDB-2022-018968" }, { "db": "CNVD", "id": "CNVD-2023-01053" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-33735", "trust": 3.8 }, { "db": "JVNDB", "id": "JVNDB-2022-018968", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2023-01053", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202206-2763", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-01053" }, { "db": "JVNDB", "id": "JVNDB-2022-018968" }, { "db": "CNNVD", "id": "CNNVD-202206-2763" }, { "db": "NVD", "id": "CVE-2022-33735" } ] }, "id": "VAR-202206-2226", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2023-01053" } ], "trust": 1.2666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-01053" } ] }, "last_update_date": "2024-08-14T15:11:24.967000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for HUAWEI WS7200-10 Access Control Error Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/380816" }, { "title": "Huawei WS7200-10 Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=208405" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-01053" }, { "db": "CNNVD", "id": "CNNVD-202206-2763" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-307", "trust": 1.0 }, { "problemtype": "Inappropriate limitation of excessive authentication attempts (CWE-307) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018968" }, { "db": "NVD", "id": "CVE-2022-33735" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220628-01-2eda0853-en" }, { "trust": 1.2, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20220628-01-2eda0853-cn" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33735" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-33735/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-01053" }, { "db": "JVNDB", "id": "JVNDB-2022-018968" }, { "db": "CNNVD", "id": "CNNVD-202206-2763" }, { "db": "NVD", "id": "CVE-2022-33735" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2023-01053" }, { "db": "JVNDB", "id": "JVNDB-2022-018968" }, { "db": "CNNVD", "id": "CNNVD-202206-2763" }, { "db": "NVD", "id": "CVE-2022-33735" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "CNVD", "id": "CNVD-2023-01053" }, { "date": "2023-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018968" }, { "date": "2022-06-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-2763" }, { "date": "2022-09-20T20:15:09.927000", "db": "NVD", "id": "CVE-2022-33735" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-05T00:00:00", "db": "CNVD", "id": "CNVD-2023-01053" }, { "date": "2023-10-24T03:00:00", "db": "JVNDB", "id": "JVNDB-2022-018968" }, { "date": "2022-09-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-2763" }, { "date": "2022-09-22T12:47:44.607000", "db": "NVD", "id": "CVE-2022-33735" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-2763" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0WS7200-10\u00a0 Firmware Improperly Limiting Excessive Authentication Attempts Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018968" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-2763" } ], "trust": 0.6 } }