fkie_cve-2021-22409
Vulnerability from fkie_nvd
Published
2021-05-20 20:15
Modified
2024-11-21 05:50
Severity ?
Summary
There is a denial of service vulnerability in some versions of ManageOne. There is a logic error in the implementation of a function of a module. When the service pressure is heavy, there is a low probability that an exception may occur. Successful exploit may cause some services abnormal.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | manageone | 6.5 | |
huawei | manageone | 6.5.0 | |
huawei | manageone | 6.5.0 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1 | |
huawei | manageone | 6.5.1.1 | |
huawei | manageone | 6.5.1.1 | |
huawei | manageone | 6.5.1.1 | |
huawei | manageone | 6.5.1.1 | |
huawei | manageone | 8.0.0 | |
huawei | manageone | 8.0.0 | |
huawei | manageone | 8.0.0 | |
huawei | manageone | 8.0.0 | |
huawei | manageone | 8.0.0 | |
huawei | manageone | 8.0.0 | |
huawei | manageone | 8.0.0 | |
huawei | manageone | 8.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:huawei:manageone:6.5:rc2.b050:*:*:*:*:*:*", "matchCriteriaId": "F4A02F6E-42F5-49C3-9B23-3FA4D18F7362", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B85321E0-8B1B-452B-A1AE-D8BB85C18CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.0:spc100.b210:*:*:*:*:*:*", "matchCriteriaId": "1F587216-1355-4DD6-83E2-27CCE4ACC2E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc1.b080:*:*:*:*:*:*", "matchCriteriaId": "4FF1D67F-B436-42A2-B783-87BF5C289A3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b020:*:*:*:*:*:*", "matchCriteriaId": "61EC963F-1160-43D4-B4E4-2CC2B209B4DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b030:*:*:*:*:*:*", "matchCriteriaId": "2B7820BE-0307-40F3-A7BD-66D5B8C7A0A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b040:*:*:*:*:*:*", "matchCriteriaId": "AD086E38-D1F5-4160-A7A2-12E681F686CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b060:*:*:*:*:*:*", "matchCriteriaId": "DDDB5BDF-9760-4EE6-947D-A633B9CC0D36", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b070:*:*:*:*:*:*", "matchCriteriaId": "31787857-76F6-4E80-82B7-56B1C12B6628", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b080:*:*:*:*:*:*", "matchCriteriaId": "3495FF32-2906-4064-A636-64EB3A06421D", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b090:*:*:*:*:*:*", "matchCriteriaId": "73901E08-8C24-46FB-A42D-6457630AA6DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc100.b050:*:*:*:*:*:*", "matchCriteriaId": "A472E9AA-784F-4AE2-B1D8-6C77EA1664B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc101.b010:*:*:*:*:*:*", "matchCriteriaId": "F7CC07B4-FBF6-4AC9-8C54-B7845A068BBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc101.b040:*:*:*:*:*:*", "matchCriteriaId": "36904A81-9DCD-4E65-ADC1-A5A96FA0D939", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200:*:*:*:*:*:*", "matchCriteriaId": "481FA740-3E71-443D-99DF-89CA198951A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b010:*:*:*:*:*:*", "matchCriteriaId": "37636652-DC9E-4310-AB33-1C67B85A7BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b030:*:*:*:*:*:*", "matchCriteriaId": "C462984C-407A-4D52-BEDD-7E300482E2AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b040:*:*:*:*:*:*", "matchCriteriaId": "154A70F1-C15A-41B1-97B8-89550595BF44", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b050:*:*:*:*:*:*", "matchCriteriaId": "B58D9F18-F7B5-4514-978D-EC419614F521", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b060:*:*:*:*:*:*", "matchCriteriaId": "BD51B07E-213B-4D32-A121-E2FD124EA1A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b070:*:*:*:*:*:*", "matchCriteriaId": "7926B343-242E-414B-B573-84DB16A2FCBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1.1:b010:*:*:*:*:*:*", "matchCriteriaId": "463A4059-55EF-4862-B8AD-90DCAC0CC871", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1.1:b020:*:*:*:*:*:*", "matchCriteriaId": "4042FC49-4FC7-46B4-8D14-ECACF22A9860", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1.1:b030:*:*:*:*:*:*", "matchCriteriaId": "A4D8799F-9ADD-442F-BC39-4BCAFBFFBE2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:6.5.1.1:b040:*:*:*:*:*:*", "matchCriteriaId": "535597A4-29C8-44A8-9008-4F4E10030531", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "EFA5EBB8-C174-4CF0-ADE6-15B62C10DD86", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:lcnd81:*:*:*:*:*:*", "matchCriteriaId": "E9090F1E-EF60-4E54-9885-7F6B1681DE9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "51E51969-9D4D-4A58-BEBD-19F4BD64BC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "2A1E9FF8-C0A4-47A5-9738-4D0ADB35DAF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:rc3.b041:*:*:*:*:*:*", "matchCriteriaId": "1B552573-DB7A-4454-A832-AE1811A9577C", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:rc3.spc100:*:*:*:*:*:*", "matchCriteriaId": "5D17BA55-6032-4BC4-BEB3-4FB27BA81777", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:8.0.0:spc100:*:*:*:*:*:*", "matchCriteriaId": "7EDE7C94-7E89-45E6-8A79-32E53D9139DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:manageone:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "47A8E919-FAC0-4011-927F-599AA7688A32", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a denial of service vulnerability in some versions of ManageOne. There is a logic error in the implementation of a function of a module. When the service pressure is heavy, there is a low probability that an exception may occur. Successful exploit may cause some services abnormal." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de denegaci\u00f3n de servicio en algunas versiones de ManageOne.\u0026#xa0;Se presenta un error l\u00f3gico en la implementaci\u00f3n de una funci\u00f3n de un m\u00f3dulo.\u0026#xa0;Cuando la presi\u00f3n de servicio es alta, se presenta una baja probabilidad de que ocurra una excepci\u00f3n.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito puede causar que algunos servicios sean anormales" } ], "id": "CVE-2021-22409", "lastModified": "2024-11-21T05:50:04.227", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-20T20:15:07.360", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-02-dos-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-02-dos-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…