ID CVE-2016-3678
Type cve
Reporter cve@mitre.org
Modified 2016-04-14T20:18:00
Description
Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.
{"id": "CVE-2016-3678", "bulletinFamily": "NVD", "title": "CVE-2016-3678", "description": "Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic.", "published": "2016-04-11T15:59:00", "modified": "2016-04-14T20:18:00", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3678", "reporter": "cve@mitre.org", "references": ["http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en"], "cvelist": ["CVE-2016-3678"], "type": "cve", "lastseen": "2019-05-29T18:15:36", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "e72d31a03b56387e0c929b6ad0e89084"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "69701762028957f969dd540f1de1297e"}, {"key": "cpe23", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvelist", "hash": "486fe945469717e7f2de0e04739964fe"}, {"key": "cvss", "hash": "5a4bd22c495ccbe3aa9b54cab81d2473"}, {"key": "cvss2", "hash": "3ecceba99b058ba5d72ead696e11bb94"}, {"key": "cvss3", "hash": "b5cef30da83f9b368c6b3bb523042642"}, {"key": "cwe", "hash": "226da5129ffaaee3d5b48e506b957d58"}, {"key": "description", "hash": "11b38c50c026b78dabdbb7bacb4432ee"}, {"key": "href", "hash": "62c2b185ac5ba72a95069db617af1707"}, {"key": "modified", "hash": "622d4a23d337fb81d08c5cbc517a108f"}, {"key": "published", "hash": "8a54d5e6bc673363f9802ba6bc83f5eb"}, {"key": "references", "hash": "37228d54ad3d8fc21827f4f2eac1e3f5"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "f04e08b8674c78486b794e26e59b18e9"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "94b322cfb217954caddeb97cccab3f00f1bf5fd809b0f16c76582af9166c44d9", "viewCount": 0, "enchantments": {"score": {"value": 5.5, "vector": "NONE", "modified": "2019-05-29T18:15:36"}, "dependencies": {"references": [{"type": "huawei", "idList": ["HUAWEI-SA-20160330-01-SWITCH"]}], "modified": "2019-05-29T18:15:36"}, "vulnersScore": 5.5}, "objectVersion": "1.3", "cpe": ["cpe:/a:huawei:s7700_firmware:v200r003c00spc500", "cpe:/a:huawei:s5300_firmware:v200r003c00spc500", "cpe:/a:huawei:s5700_firmware:v200r003c00spc500", "cpe:/a:huawei:s9700_firmware:v200r003c00spc500", "cpe:/a:huawei:s9300_firmware:v200r003c00spc500"], "affectedSoftware": [{"name": "huawei s9700_firmware", "operator": "eq", "version": "v200r003c00spc500"}, {"name": "huawei s7700_firmware", "operator": "eq", "version": "v200r003c00spc500"}, {"name": "huawei s5300_firmware", "operator": "eq", "version": "v200r003c00spc500"}, {"name": "huawei s9300_firmware", "operator": "eq", "version": "v200r003c00spc500"}, {"name": "huawei s5700_firmware", "operator": "eq", "version": "v200r003c00spc500"}], "cvss2": {"acInsufInfo": true, "cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH"}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, "cpe23": [], "cwe": ["CWE-20"]}
{"huawei": [{"lastseen": "2019-02-01T18:02:18", "bulletinFamily": "software", "description": "Products\n\nSwitches\nRouters\nWLAN\nServers\nSee All\n\n\n\nSolutions\n\nCloud Data Center\nEnterprise Networking\nWireless Private Network\nSolutions by Industry\nSee All\n\n\n\nServices\n\nTraining and Certification\nICT Lifecycle Services\nTechnology Services\nIndustry Solution Services\nSee All\n\n\n\nSee all offerings at e.huawei.com\n\n\n\nNeed Support ?\n\nProduct Support\nSoftware Download\nCommunity\nTools\n\nGo to Full Support", "modified": "2016-03-30T00:00:00", "published": "2016-03-30T00:00:00", "id": "HUAWEI-SA-20160330-01-SWITCH", "href": "https://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20160330-01-switch-en", "title": "Security Advisory - DoS Vulnerability in Huawei S Series Switches", "type": "huawei", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}]}