Lucene search

K
cveHuaweiCVE-2018-7950
HistoryJun 01, 2018 - 2:29 p.m.

CVE-2018-7950

2018-06-0114:29:00
CWE-94
huawei
web.nvd.nist.gov
32
huawei
server
ibmc
json injection
vulnerability
privilege escalation
cve-2018-7950

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.002

Percentile

53.5%

The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a JSON injection vulnerability due to insufficient input validation. An authenticated, remote attacker can launch a JSON injection to modify the password of administrator. Successful exploit may allow attackers to obtain the management privilege of the system.

Affected configurations

Nvd
Node
huawei1288h_v5_firmwareMatch100r005c00
AND
huawei1288h_v5Match-
Node
huawei2288h_v5_firmwareMatch100r005c00
AND
huawei2288h_v5Match-
Node
huawei2488_v5_firmwareMatch100r005c00
AND
huawei2488_v5Match-
Node
huaweich121_v3_firmwareMatch100r001c00
AND
huaweich121_v3Match-
Node
huaweich121l_v3_firmwareMatch100r001c00
AND
huaweich121l_v3Match-
Node
huaweich121l_v5_firmwareMatch100r001c00
AND
huaweich121l_v5Match-
Node
huaweich121_v5_firmwareMatch100r001c00
AND
huaweich121_v5Match-
Node
huaweich140_v3_firmwareMatch100r001c00
AND
huaweich140_v3Match-
Node
huaweich140l_v3_firmwareMatch100r001c00
AND
huaweich140l_v3Match-
Node
huaweich220_v3_firmwareMatch100r001c00
AND
huaweich220_v3Match-
Node
huaweich222_v3_firmwareMatch100r001c00
AND
huaweich222_v3Match-
Node
huaweich242_v3_firmwareMatch100r001c00
AND
huaweich242_v3Match-
Node
huaweich242_v5_firmwareMatch100r001c00
AND
huaweich242_v5Match-
Node
huaweirh1288_v3_firmwareMatch100r003c00
AND
huaweirh1288_v3Match-
Node
huaweirh2288_v3_firmwareMatch100r003c00
AND
huaweirh2288_v3Match-
Node
huaweixh310_v3_firmwareMatch100r003c00
AND
huaweixh310_v3Match-
Node
huaweixh321_v3_firmwareMatch100r003c00
AND
huaweixh321_v3Match-
Node
huaweixh321_v5_firmwareMatch100r005c00
AND
huaweixh321_v5Match-
Node
huaweirh2288h_v3_firmwareMatch100r003c00
AND
huaweirh2288h_v3Match-
Node
huaweixh620_v3_firmwareMatch100r003c00
AND
huaweixh620_v3Match-
VendorProductVersionCPE
huawei1288h_v5_firmware100r005c00cpe:2.3:o:huawei:1288h_v5_firmware:100r005c00:*:*:*:*:*:*:*
huawei1288h_v5-cpe:2.3:h:huawei:1288h_v5:-:*:*:*:*:*:*:*
huawei2288h_v5_firmware100r005c00cpe:2.3:o:huawei:2288h_v5_firmware:100r005c00:*:*:*:*:*:*:*
huawei2288h_v5-cpe:2.3:h:huawei:2288h_v5:-:*:*:*:*:*:*:*
huawei2488_v5_firmware100r005c00cpe:2.3:o:huawei:2488_v5_firmware:100r005c00:*:*:*:*:*:*:*
huawei2488_v5-cpe:2.3:h:huawei:2488_v5:-:*:*:*:*:*:*:*
huaweich121_v3_firmware100r001c00cpe:2.3:o:huawei:ch121_v3_firmware:100r001c00:*:*:*:*:*:*:*
huaweich121_v3-cpe:2.3:h:huawei:ch121_v3:-:*:*:*:*:*:*:*
huaweich121l_v3_firmware100r001c00cpe:2.3:o:huawei:ch121l_v3_firmware:100r001c00:*:*:*:*:*:*:*
huaweich121l_v3-cpe:2.3:h:huawei:ch121l_v3:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 401

CNA Affected

[
  {
    "product": "1288H V5; 2288H V5; 2488 V5 ; CH121 V3; CH121L V3; CH121L V5 ; CH121 V5 ; CH140 V3; CH140L V3; CH220 V3; CH222 V3; CH242 V3; CH242 V5 ; RH1288 V3; RH2288 V3; RH2288H V3; XH310 V3; XH321 V3; XH321 V5; XH620 V3",
    "vendor": "Huawei Technologies Co., Ltd.",
    "versions": [
      {
        "status": "affected",
        "version": "1288H V5 V100R005C00"
      },
      {
        "status": "affected",
        "version": "2288H V5 V100R005C00"
      },
      {
        "status": "affected",
        "version": "2488 V5 V100R005C00"
      },
      {
        "status": "affected",
        "version": "CH121 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH121L V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH121L V5 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH121 V5 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH140 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH140L V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH220 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH222 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH242 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH242 V5 V100R001C00"
      },
      {
        "status": "affected",
        "version": "RH1288 V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "RH2288 V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "RH2288H V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "XH310 V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "XH321 V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "XH321 V5 V100R005C00"
      },
      {
        "status": "affected",
        "version": "XH620 V3 V100R003C00"
      }
    ]
  }
]

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.002

Percentile

53.5%

Related for CVE-2018-7950