6.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:N/I:N/A:C
5.7 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
46.4%
There is an DoS vulnerability in some Huawei products due to insufficient validation of the parameter when a putty comment key is loaded. An authenticated remote attacker can place a malformed putty key file in system, when a system manager load the key, an infinite loop happens which lead to reboot the system. (Vulnerability ID: HWPSIRT-2017-06039)
This vulnerability has been assigned a CVE ID: CVE-2017-17131.
Huawei has released software updates to fix this vulnerability. This advisory is available at the following link:
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-vpp-en
CPE | Name | Operator | Version |
---|---|---|---|
dp300 | eq | V500R002C00 | |
rp200 | eq | V500R002C00 | |
rp200 | eq | V600R006C00 | |
te30 | eq | V100R001C10 | |
te30 | eq | V600R006C00 | |
te50 | eq | V600R006C00 | |
te60 | eq | V100R001C10 | |
te60 | eq | V500R002C00 | |
te60 | eq | V600R006C00 | |
vp9660 | eq | V500R002C10 |
6.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:N/I:N/A:C
5.7 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
46.4%