cnvd-2021-24919
Vulnerability from cnvd

Title: 多款Huawei产品信息泄露漏洞(CNVD-2021-24919)

Description:

Huawei NIP6300等都是中国华为(Huawei)公司的产品。Huawei NIP6300是一款主要适用于企业、学校、运行商、IDC的入侵防御系统。Huawei NIP6600是一款主要适用于企业、学校、运行商、IDC的入侵防御系统。Huawei Secospace USG6300是一款防火墙设备。

多款Huawei产品存在信息泄露漏洞。该漏洞源于不合理设计,在某个特殊异常场景下,服务器日志会打印出一些具体的不合理信息,攻击者可利用漏洞导致信息泄露。

Severity:

Patch Name: 多款Huawei产品信息泄露漏洞(CNVD-2021-24919)的补丁

Patch Description:

Huawei NIP6300等都是中国华为(Huawei)公司的产品。Huawei NIP6300是一款主要适用于企业、学校、运行商、IDC的入侵防御系统。Huawei NIP6600是一款主要适用于企业、学校、运行商、IDC的入侵防御系统。Huawei Secospace USG6300是一款防火墙设备。

多款Huawei产品存在信息泄露漏洞。该漏洞源于不合理设计,在某个特殊异常场景下,服务器日志会打印出一些具体的不合理信息,攻击者可利用漏洞导致信息泄露。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

用户可参考如下供应商提供的安全公告获得补丁信息: https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en

Reference: https://nvd.nist.gov/vuln/detail/CVE-2021-22310

Impacted products
Name
['Huawei NIP6300 V500R001C00', 'Huawei NIP6600 V500R001C00', 'Huawei Secospace USG6500 V500R001C00', 'Huawei Secospace USG6600 V500R001C00', 'Huawei NIP6300 V500R001C20', 'Huawei NIP6300 V500R001C30', 'Huawei NIP6600 V500R001C20', 'Huawei NIP6600 V500R001C30', 'Huawei Secospace USG6300 V500R001C00', 'Huawei Secospace USG6300 V500R001C20', 'Huawei Secospace USG6500 V500R001C20', 'Huawei Secospace USG6500 V500R001C30', 'Huawei Secospace USG6600 V500R001C20', 'Huawei Secospace USG6600 V500R001C30', 'Huawei Secospace USG6600 V500R001C50', 'Huawei USG9500 V500R005C00', 'Huawei Secospace USG6600 V500R001C60', 'Huawei USG9500 V500R005C10', 'Huawei Secospace USG6300 V500R001C30']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2021-22310",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-22310"
    }
  },
  "description": "Huawei NIP6300\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Huawei NIP6300\u662f\u4e00\u6b3e\u4e3b\u8981\u9002\u7528\u4e8e\u4f01\u4e1a\u3001\u5b66\u6821\u3001\u8fd0\u884c\u5546\u3001IDC\u7684\u5165\u4fb5\u9632\u5fa1\u7cfb\u7edf\u3002Huawei NIP6600\u662f\u4e00\u6b3e\u4e3b\u8981\u9002\u7528\u4e8e\u4f01\u4e1a\u3001\u5b66\u6821\u3001\u8fd0\u884c\u5546\u3001IDC\u7684\u5165\u4fb5\u9632\u5fa1\u7cfb\u7edf\u3002Huawei Secospace USG6300\u662f\u4e00\u6b3e\u9632\u706b\u5899\u8bbe\u5907\u3002 \n\n\u591a\u6b3eHuawei\u4ea7\u54c1\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4e0d\u5408\u7406\u8bbe\u8ba1\uff0c\u5728\u67d0\u4e2a\u7279\u6b8a\u5f02\u5e38\u573a\u666f\u4e0b\uff0c\u670d\u52a1\u5668\u65e5\u5fd7\u4f1a\u6253\u5370\u51fa\u4e00\u4e9b\u5177\u4f53\u7684\u4e0d\u5408\u7406\u4fe1\u606f\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u5bfc\u81f4\u4fe1\u606f\u6cc4\u9732\u3002",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2021-24919",
  "openTime": "2021-04-04",
  "patchDescription": "Huawei NIP6300\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Huawei NIP6300\u662f\u4e00\u6b3e\u4e3b\u8981\u9002\u7528\u4e8e\u4f01\u4e1a\u3001\u5b66\u6821\u3001\u8fd0\u884c\u5546\u3001IDC\u7684\u5165\u4fb5\u9632\u5fa1\u7cfb\u7edf\u3002Huawei NIP6600\u662f\u4e00\u6b3e\u4e3b\u8981\u9002\u7528\u4e8e\u4f01\u4e1a\u3001\u5b66\u6821\u3001\u8fd0\u884c\u5546\u3001IDC\u7684\u5165\u4fb5\u9632\u5fa1\u7cfb\u7edf\u3002Huawei Secospace USG6300\u662f\u4e00\u6b3e\u9632\u706b\u5899\u8bbe\u5907\u3002 \r\n\r\n\u591a\u6b3eHuawei\u4ea7\u54c1\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4e0d\u5408\u7406\u8bbe\u8ba1\uff0c\u5728\u67d0\u4e2a\u7279\u6b8a\u5f02\u5e38\u573a\u666f\u4e0b\uff0c\u670d\u52a1\u5668\u65e5\u5fd7\u4f1a\u6253\u5370\u51fa\u4e00\u4e9b\u5177\u4f53\u7684\u4e0d\u5408\u7406\u4fe1\u606f\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u5bfc\u81f4\u4fe1\u606f\u6cc4\u9732\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eHuawei\u4ea7\u54c1\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2021-24919\uff09\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Huawei NIP6300 V500R001C00",
      "Huawei NIP6600 V500R001C00",
      "Huawei Secospace USG6500 V500R001C00",
      "Huawei Secospace USG6600 V500R001C00",
      "Huawei NIP6300 V500R001C20",
      "Huawei NIP6300 V500R001C30",
      "Huawei NIP6600 V500R001C20",
      "Huawei NIP6600 V500R001C30",
      "Huawei Secospace USG6300 V500R001C00",
      "Huawei Secospace USG6300 V500R001C20",
      "Huawei Secospace USG6500 V500R001C20",
      "Huawei Secospace USG6500 V500R001C30",
      "Huawei Secospace USG6600 V500R001C20",
      "Huawei Secospace USG6600 V500R001C30",
      "Huawei Secospace USG6600 V500R001C50",
      "Huawei USG9500 V500R005C00",
      "Huawei Secospace USG6600 V500R001C60",
      "Huawei USG9500 V500R005C10",
      "Huawei Secospace USG6300 V500R001C30"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-22310",
  "serverity": "\u4f4e",
  "submitTime": "2021-02-05",
  "title": "\u591a\u6b3eHuawei\u4ea7\u54c1\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2021-24919\uff09"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…