Lucene search

K
cve[email protected]CVE-2017-17169
HistoryMar 09, 2018 - 5:29 p.m.

CVE-2017-17169

2018-03-0917:29:00
CWE-20
web.nvd.nist.gov
21
cve-2017-17169
cidam protocol
input validation
huawei products
security vulnerability

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:P/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

6.4 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.0%

The CIDAM Protocol on some Huawei Products has multiple input validation vulnerabilities due to insufficient validation of specific messages when the protocol is implemented. An authenticated remote attacker could send a malicious message to a target system. Successful exploit could allow the attacker to tamper with business and make the system abnormal. Affected Huawei Products are: DP300 versions V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00B012, V500R002C00B013, V500R002C00B014, V500R002C00B017, V500R002C00B018, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC400, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00; RP200 versions V500R002C00SPC200, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE30 versions V100R001C10SPC300, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700B010, V500R002C00SPC200, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE40 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE50 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE60 versions V100R001C10, V100R001C10B001, V100R001C10B002, V100R001C10B010, V100R001C10B011, V100R001C10B012, V100R001C10B013, V100R001C10B014, V100R001C10B016, V100R001C10B017, V100R001C10B018, V100R001C10B019, V100R001C10SPC400, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700, V100R001C10SPC800B011, V100R001C10SPC900, V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00, V500R002C00SPCb00, V500R002C00SPCd00, V500R002C00SPCe00, V600R006C00, V600R006C00SPC100, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; eSpace U1981 version V200R003C20SPC900.

Affected configurations

NVD
Node
huaweidp300_firmwareMatchv500r002c00
OR
huaweidp300_firmwareMatchv500r002c00b010
OR
huaweidp300_firmwareMatchv500r002c00b011
OR
huaweidp300_firmwareMatchv500r002c00b012
OR
huaweidp300_firmwareMatchv500r002c00b013
OR
huaweidp300_firmwareMatchv500r002c00b014
OR
huaweidp300_firmwareMatchv500r002c00b017
OR
huaweidp300_firmwareMatchv500r002c00b018
OR
huaweidp300_firmwareMatchv500r002c00spc100
OR
huaweidp300_firmwareMatchv500r002c00spc200
OR
huaweidp300_firmwareMatchv500r002c00spc300
OR
huaweidp300_firmwareMatchv500r002c00spc400
OR
huaweidp300_firmwareMatchv500r002c00spc500
OR
huaweidp300_firmwareMatchv500r002c00spc600
OR
huaweidp300_firmwareMatchv500r002c00spc800
OR
huaweidp300_firmwareMatchv500r002c00spc900
OR
huaweidp300_firmwareMatchv500r002c00spca00
AND
huaweidp300Match-

CNA Affected

[
  {
    "product": "DP300, RP200, TE30, TE40, TE50, TE60, eSpace U1981",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "V500R002C00"
      },
      {
        "status": "affected",
        "version": "V500R002C00B010"
      },
      {
        "status": "affected",
        "version": "V500R002C00B011"
      },
      {
        "status": "affected",
        "version": "V500R002C00B012"
      },
      {
        "status": "affected",
        "version": "V500R002C00B013"
      },
      {
        "status": "affected",
        "version": "V500R002C00B014"
      },
      {
        "status": "affected",
        "version": "V500R002C00B017"
      },
      {
        "status": "affected",
        "version": "V500R002C00B018"
      },
      {
        "status": "affected",
        "version": "V500R002C00SPC100"
      },
      {
        "status": "affected",
        "version": "V500R002C00SPC200"
      },
      {
        "status": "affected",
        "version": "V500R002C00SPC300"
      },
      {
        "status": "affected",
        "version": "V500R002C00SPC400"
      },
      {
        "status": "affected",
        "version": "V500R002C00SPC500"
      },
      {
        "status": "affected",
        "version": "V500R002C00SPC600"
      },
      {
        "status": "affected",
        "version": "V500R002C00SPC800"
      },
      {
        "status": "affected",
        "version": "V500R002C00SPC900"
      },
      {
        "status": "affected",
        "version": "V500R002C00SPCa00"
      },
      {
        "status": "affected",
        "version": "V600R006C00"
      },
      {
        "status": "affected",
        "version": "V600R006C00SPC200"
      },
      {
        "status": "affected",
        "version": "V600R006C00SPC300"
      },
      {
        "status": "affected",
        "version": "V600R006C00SPC400"
      },
      {
        "status": "affected",
        "version": "V600R006C00SPC500"
      },
      {
        "status": "affected",
        "version": "V100R001C10SPC300"
      },
      {
        "status": "affected",
        "version": "V100R001C10SPC500"
      },
      {
        "status": "affected",
        "version": "V100R001C10SPC600"
      },
      {
        "status": "affected",
        "version": "V100R001C10SPC700B010"
      },
      {
        "status": "affected",
        "version": "V500R002C00SPC700"
      },
      {
        "status": "affected",
        "version": "V500R002C00SPCb00"
      },
      {
        "status": "affected",
        "version": "V100R001C10"
      },
      {
        "status": "affected",
        "version": "V100R001C10B001"
      },
      {
        "status": "affected",
        "version": "V100R001C10B002"
      },
      {
        "status": "affected",
        "version": "V100R001C10B010"
      },
      {
        "status": "affected",
        "version": "V100R001C10B011"
      },
      {
        "status": "affected",
        "version": "V100R001C10B012"
      },
      {
        "status": "affected",
        "version": "V100R001C10B013"
      },
      {
        "status": "affected",
        "version": "V100R001C10B014"
      },
      {
        "status": "affected",
        "version": "V100R001C10B016"
      },
      {
        "status": "affected",
        "version": "V100R001C10B017"
      },
      {
        "status": "affected",
        "version": "V100R001C10B018"
      },
      {
        "status": "affected",
        "version": "V100R001C10B019"
      },
      {
        "status": "affected",
        "version": "V100R001C10SPC400"
      },
      {
        "status": "affected",
        "version": "V100R001C10SPC700"
      },
      {
        "status": "affected",
        "version": "V100R001C10SPC800B011"
      },
      {
        "status": "affected",
        "version": "V100R001C10SPC900"
      },
      {
        "status": "affected",
        "version": "V500R002C00SPCd00"
      },
      {
        "status": "affected",
        "version": "V500R002C00SPCe00"
      },
      {
        "status": "affected",
        "version": "V600R006C00SPC100"
      },
      {
        "status": "affected",
        "version": "V200R003C20SPC900"
      }
    ]
  }
]

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:P/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

6.4 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.0%

Related for CVE-2017-17169