Lucene search

K
cve[email protected]CVE-2019-5285
HistoryJun 04, 2019 - 7:29 p.m.

CVE-2019-5285

2019-06-0419:29:00
CWE-20
web.nvd.nist.gov
199
huawei
s series switches
dos vulnerability
remote attacker
crafted packets
insufficient verification
reboot
denial of service
nvd
cve-2019-5285
hwpsirt-2019-03109

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.002 Low

EPSS

Percentile

64.5%

Some Huawei S series switches have a DoS vulnerability. An unauthenticated remote attacker can send crafted packets to the affected device to exploit this vulnerability. Due to insufficient verification of the packets, successful exploitation may cause the device reboot and denial of service (DoS) condition. (Vulnerability ID: HWPSIRT-2019-03109)

Affected configurations

NVD
Node
huaweis12700Match-
AND
huaweis12700_firmwareMatchv200r005c00
OR
huaweis12700_firmwareMatchv200r006c00
OR
huaweis12700_firmwareMatchv200r007c00
OR
huaweis12700_firmwareMatchv200r008c00
OR
huaweis12700_firmwareMatchv200r010c00
OR
huaweis12700_firmwareMatchv200r011c10
OR
huaweis12700_firmwareMatchv200r012c00
OR
huaweis12700_firmwareMatchv200r013c00
Node
huaweis1700Match-
AND
huaweis1700_firmwareMatchv200r008c00
OR
huaweis1700_firmwareMatchv200r009c00
OR
huaweis1700_firmwareMatchv200r010c00
OR
huaweis1700_firmwareMatchv200r011c10
OR
huaweis1700_firmwareMatchv200r012c00
OR
huaweis1700_firmwareMatchv200r013c00
Node
huaweis2300Match-
AND
huaweis2300_firmwareMatchv200r003c00
OR
huaweis2300_firmwareMatchv200r005c00
OR
huaweis2300_firmwareMatchv200r008c00
OR
huaweis2300_firmwareMatchv200r010c00
OR
huaweis2300_firmwareMatchv200r011c10
OR
huaweis2300_firmwareMatchv200r012c00
OR
huaweis2300_firmwareMatchv200r013c00
Node
huaweis2700_firmwareMatchv200r005c00
OR
huaweis2700_firmwareMatchv200r006c00
OR
huaweis2700_firmwareMatchv200r007c00
OR
huaweis2700_firmwareMatchv200r008c00
OR
huaweis2700_firmwareMatchv200r010c00
OR
huaweis2700_firmwareMatchv200r011c10
OR
huaweis2700_firmwareMatchv200r012c00
OR
huaweis2700_firmwareMatchv200r013c00
AND
huaweis2700Match-
Node
huaweis5300_firmwareMatchv200r003c00
OR
huaweis5300_firmwareMatchv200r005c00
OR
huaweis5300_firmwareMatchv200r008c00
OR
huaweis5300_firmwareMatchv200r010c00
OR
huaweis5300_firmwareMatchv200r011c10
OR
huaweis5300_firmwareMatchv200r012c00
OR
huaweis5300_firmwareMatchv200r013c00
AND
huaweis5300Match-
Node
huaweis5700_firmwareMatchv200r003c00
OR
huaweis5700_firmwareMatchv200r005c00
OR
huaweis5700_firmwareMatchv200r006c00
OR
huaweis5700_firmwareMatchv200r007c00
OR
huaweis5700_firmwareMatchv200r008c00
OR
huaweis5700_firmwareMatchv200r010c00
OR
huaweis5700_firmwareMatchv200r011c10
OR
huaweis5700_firmwareMatchv200r012c00
OR
huaweis5700_firmwareMatchv200r013c00
AND
huaweis5700Match-
Node
huaweis600-e_firmwareMatchv200r008c00
OR
huaweis600-e_firmwareMatchv200r010c00
OR
huaweis600-e_firmwareMatchv200r011c10
OR
huaweis600-e_firmwareMatchv200r012c00
OR
huaweis600-e_firmwareMatchv200r013c00
AND
huaweis600-eMatch-
Node
huaweis6300_firmwareMatchv200r003c00
OR
huaweis6300_firmwareMatchv200r005c00
OR
huaweis6300_firmwareMatchv200r007c00
OR
huaweis6300_firmwareMatchv200r008c00
OR
huaweis6300_firmwareMatchv200r010c00
OR
huaweis6300_firmwareMatchv200r011c10
OR
huaweis6300_firmwareMatchv200r012c00
OR
huaweis6300_firmwareMatchv200r013c00
AND
huaweis6300Match-
Node
huaweis6700_firmwareMatchv200r003c00
OR
huaweis6700_firmwareMatchv200r005c00
OR
huaweis6700_firmwareMatchv200r007c00
OR
huaweis6700_firmwareMatchv200r008c00
OR
huaweis6700_firmwareMatchv200r010c00
OR
huaweis6700_firmwareMatchv200r011c10
OR
huaweis6700_firmwareMatchv200r012c00
OR
huaweis6700_firmwareMatchv200r013c00
AND
huaweis6700
Node
huaweis7700_firmwareMatchv200r003c00
OR
huaweis7700_firmwareMatchv200r005c00
OR
huaweis7700_firmwareMatchv200r006c00
OR
huaweis7700_firmwareMatchv200r007c00
OR
huaweis7700_firmwareMatchv200r008c00
OR
huaweis7700_firmwareMatchv200r010c00
OR
huaweis7700_firmwareMatchv200r011c10
OR
huaweis7700_firmwareMatchv200r012c00
OR
huaweis7700_firmwareMatchv200r013c00
AND
huaweis7700Match-
Node
huaweis7900_firmwareMatchv200r011c10
OR
huaweis7900_firmwareMatchv200r012c00
OR
huaweis7900_firmwareMatchv200r013c00
AND
huaweis7900Match-
Node
huaweis9300_firmwareMatchv200r003c00
OR
huaweis9300_firmwareMatchv200r008c00
OR
huaweis9300_firmwareMatchv200r008c10
OR
huaweis9300_firmwareMatchv200r010c00
OR
huaweis9300_firmwareMatchv200r011c10
OR
huaweis9300_firmwareMatchv200r012c00
OR
huaweis9300_firmwareMatchv200r013c00
AND
huaweis9300Match-
Node
huaweis9300x_firmwareMatchv200r010c00
OR
huaweis9300x_firmwareMatchv200r011c10
OR
huaweis9300x_firmwareMatchv200r012c00
OR
huaweis9300x_firmwareMatchv200r013c00
AND
huaweis9300xMatch-
Node
huaweis9700_firmwareMatchv200r003c00
OR
huaweis9700_firmwareMatchv200r005c00
OR
huaweis9700_firmwareMatchv200r006c00
OR
huaweis9700_firmwareMatchv200r007c00
OR
huaweis9700_firmwareMatchv200r008c00
OR
huaweis9700_firmwareMatchv200r010c00
OR
huaweis9700_firmwareMatchv200r011c10
OR
huaweis9700_firmwareMatchv200r012c00
OR
huaweis9700_firmwareMatchv200r013c00
AND
huaweis9700Match-

CNA Affected

[
  {
    "product": "S12700, S12700, S12700, S12700, S12700, S12700, S12700, S12700, S1700, S1700, S1700, S1700, S1700, S1700, S2300, S2300, S2300, S2300, S2300, S2300, S2300, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S2700, S5300, S5300, S5300, S5300, S5300, S5300, S5300, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S5700, S600-E, S600-E, S600-E, S600-E, S600-E, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6300, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S6700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7700, S7900, S7900, S7900, S9300, S9300, S9300, S9300, S9300, S9300, S9300, S9300X, S9300X, S9300X, S9300X, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700, S9700",
    "vendor": "Huawei",
    "versions": [
      {
        "status": "affected",
        "version": "S12700 V200R008C00"
      },
      {
        "status": "affected",
        "version": "S12700 V200R010C00"
      },
      {
        "status": "affected",
        "version": "S12700 V200R012C00"
      },
      {
        "status": "affected",
        "version": "S12700 V200R013C00"
      },
      {
        "status": "affected",
        "version": "S12700 V200R011C10"
      },
      {
        "status": "affected",
        "version": "S1700 V200R008C00"
      },
      {
        "status": "affected",
        "version": "S1700 V200R009C00"
      },
      {
        "status": "affected",
        "version": "S1700 V200R010C00"
      },
      {
        "status": "affected",
        "version": "S1700 V200R011C10"
      },
      {
        "status": "affected",
        "version": "S2300 V200R003C00"
      },
      {
        "status": "affected",
        "version": "S2300 V200R005C00"
      },
      {
        "status": "affected",
        "version": "S2300 V200R008C00"
      },
      {
        "status": "affected",
        "version": "S2300 V200R010C00"
      },
      {
        "status": "affected",
        "version": "S2300 V200R011C10"
      },
      {
        "status": "affected",
        "version": "S2300 V200R012C00"
      },
      {
        "status": "affected",
        "version": "S2300 V200R013C00"
      },
      {
        "status": "affected",
        "version": "S2700 V200R005C00"
      },
      {
        "status": "affected",
        "version": "S2700 V200R006C00"
      },
      {
        "status": "affected",
        "version": "S2700 V200R007C00"
      },
      {
        "status": "affected",
        "version": "S2700 V200R008C00"
      },
      {
        "status": "affected",
        "version": "S2700 V200R010C00"
      },
      {
        "status": "affected",
        "version": "S2700 V200R011C10"
      },
      {
        "status": "affected",
        "version": "S2700 V200R012C00"
      },
      {
        "status": "affected",
        "version": "S2700 V200R013C00"
      },
      {
        "status": "affected",
        "version": "S5300 V200R003C00"
      },
      {
        "status": "affected",
        "version": "S5300 V200R005C00"
      },
      {
        "status": "affected",
        "version": "S5300 V200R008C00"
      },
      {
        "status": "affected",
        "version": "S5300 V200R010C00"
      },
      {
        "status": "affected",
        "version": "S5300 V200R011C10"
      },
      {
        "status": "affected",
        "version": "S5300 V200R012C00"
      },
      {
        "status": "affected",
        "version": "S5700 V200R006C00"
      },
      {
        "status": "affected",
        "version": "S5700 V200R007C00"
      },
      {
        "status": "affected",
        "version": "S5700 V200R008C00"
      },
      {
        "status": "affected",
        "version": "S5700 V200R010C00"
      },
      {
        "status": "affected",
        "version": "S5700 V200R011C10"
      },
      {
        "status": "affected",
        "version": "S5700 V200R012C00"
      },
      {
        "status": "affected",
        "version": "S5700 V200R013C00"
      },
      {
        "status": "affected",
        "version": "S600-E V200R008C00"
      },
      {
        "status": "affected",
        "version": "S600-E V200R010C00"
      },
      {
        "status": "affected",
        "version": "S600-E V200R011C10"
      },
      {
        "status": "affected",
        "version": "S600-E V200R012C00"
      },
      {
        "status": "affected",
        "version": "S600-E V200R013C00"
      },
      {
        "status": "affected",
        "version": "S6300 V200R003C00"
      },
      {
        "status": "affected",
        "version": "S6300 V200R005C00"
      },
      {
        "status": "affected",
        "version": "S6300 V200R007C00"
      },
      {
        "status": "affected",
        "version": "S6300 V200R008C00"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.002 Low

EPSS

Percentile

64.5%

Related for CVE-2019-5285