Lucene search

K
cveHuaweiCVE-2016-8802
HistoryApr 02, 2017 - 8:59 p.m.

CVE-2016-8802

2017-04-0220:59:01
CWE-119
huawei
web.nvd.nist.gov
35
4
huawei
secospace
usg6300
usg6500
usg6600
v500r001c20spc100
v500r001c20spc101
v500r001c20spc200
authenticated attacker
buffer overflow
cve-2016-8802
nvd

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

31.9%

The security policy processing module in Huawei Secospace USG6300 with software V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200; Secospace USG6500 with software V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200; Secospace USG6600 with software V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200 allows authenticated attackers to setup a specific security policy into the devices, causing a buffer overflow and crashing the system.

Affected configurations

Nvd
Node
huaweisecospace_usg6300_firmwareMatchv500r001c20spc100
OR
huaweisecospace_usg6300_firmwareMatchv500r001c20spc101
OR
huaweisecospace_usg6300_firmwareMatchv500r001c20spc200
AND
huaweisecospace_usg6300Match-
Node
huaweisecospace_usg6500_firmwareMatchv500r001c20spc100
OR
huaweisecospace_usg6500_firmwareMatchv500r001c20spc101
OR
huaweisecospace_usg6500_firmwareMatchv500r001c20spc200
AND
huaweisecospace_usg6500Match-
Node
huaweisecospace_usg6600_firmwareMatchv500r001c20spc100
OR
huaweisecospace_usg6600_firmwareMatchv500r001c20spc101
OR
huaweisecospace_usg6600_firmwareMatchv500r001c20spc200
AND
huaweisecospace_usg6600Match-
VendorProductVersionCPE
huaweisecospace_usg6300_firmwarev500r001c20spc100cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*
huaweisecospace_usg6300_firmwarev500r001c20spc101cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*
huaweisecospace_usg6300_firmwarev500r001c20spc200cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*
huaweisecospace_usg6300-cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*
huaweisecospace_usg6500_firmwarev500r001c20spc100cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*
huaweisecospace_usg6500_firmwarev500r001c20spc101cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*
huaweisecospace_usg6500_firmwarev500r001c20spc200cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*
huaweisecospace_usg6500-cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*
huaweisecospace_usg6600_firmwarev500r001c20spc100cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*
huaweisecospace_usg6600_firmwarev500r001c20spc101cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*
Rows per page:
1-10 of 121

CNA Affected

[
  {
    "product": "Secospace USG6300,Secospace USG6500,Secospace USG6600 Secospace USG6300 V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200,Secospace USG6500 V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200,Secospace USG6600 V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200,",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Secospace USG6300,Secospace USG6500,Secospace USG6600 Secospace USG6300 V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200,Secospace USG6500 V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200,Secospace USG6600 V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200,"
      }
    ]
  }
]

Social References

More

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

31.9%

Related for CVE-2016-8802