ID HUAWEI-SA-20131228-02.NASL Type nessus Reporter This script is Copyright (C) 2014-2018 Tenable Network Security, Inc. Modified 2019-11-02T00:00:00
Description
The remote host is a Huawei switch running a firmware version that is
affected by a security bypass vulnerability due to a failure of access
control. An authenticated attacker can exploit this vulnerability to
execute commands with higher-level permissions.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(77337);
script_version("1.4");
script_cvs_date("Date: 2018/07/12 19:01:15");
script_cve_id("CVE-2014-1688");
script_bugtraq_id(64634);
script_name(english:"Huawei CloudEngine Switch Security Bypass (HWPSIRT-2013-1256)");
script_summary(english:"Checks the firmware version.");
script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by a security bypass vulnerability.");
script_set_attribute(attribute:"description", value:
"The remote host is a Huawei switch running a firmware version that is
affected by a security bypass vulnerability due to a failure of access
control. An authenticated attacker can exploit this vulnerability to
execute commands with higher-level permissions.");
# http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-323610.htm
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?898480dd");
script_set_attribute(attribute:"solution", value:"Apply the relevant update referenced in the vendor advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2013/12/28");
script_set_attribute(attribute:"patch_publication_date", value:"2013/12/28");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/08/22");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:versatile_routing_platform");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
script_dependencies("huawei_vrp_version.nbin");
script_require_keys("Host/Huawei/VRP/Series", "Host/Huawei/VRP/Version", "Host/Huawei/VRP/Model");
exit(0);
}
include("huawei_version.inc");
model = get_kb_item_or_exit("Host/Huawei/VRP/Model");
series = get_kb_item_or_exit("Host/Huawei/VRP/Series");
version = get_kb_item_or_exit("Host/Huawei/VRP/Version");
reference = make_nested_list(
make_array(
"series", make_list("^CE[56]800$"),
"checks", make_nested_list(
make_array(
"vuln", "V100R001C00SPC200",
"fix", "V100R002C00SPC200 / V100R001SPH001",
"type", HV_CHECK_EARLIER
)
)
),
make_array(
"series", make_list("^CE12800$"),
"checks", make_nested_list(
make_array(
"vuln", "V100R001C00SPC200",
"fix", "V100R002C00SPC200 / V100R001SPH001",
"type", HV_CHECK_EARLIER
),
make_array(
"vuln", "V100R001C01SPC100",
"fix", "V100R002C00SPC200 / V100R001SPH001",
"type", HV_CHECK_EARLIER
)
)
)
);
huawei_check_and_report(
model:model,
series:series,
version:version,
reference:reference,
severity:SECURITY_HOLE
);
{"id": "HUAWEI-SA-20131228-02.NASL", "bulletinFamily": "scanner", "title": "Huawei CloudEngine Switch Security Bypass (HWPSIRT-2013-1256)", "description": "The remote host is a Huawei switch running a firmware version that is\naffected by a security bypass vulnerability due to a failure of access\ncontrol. An authenticated attacker can exploit this vulnerability to\nexecute commands with higher-level permissions.", "published": "2014-08-22T00:00:00", "modified": "2019-11-02T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.tenable.com/plugins/nessus/77337", "reporter": "This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.", "references": ["http://www.nessus.org/u?898480dd"], "cvelist": ["CVE-2014-1688"], "type": "nessus", "lastseen": "2019-11-01T02:47:27", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": ["CVE-2014-1688"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "The remote host is a Huawei switch running a firmware version that is affected by a security bypass vulnerability due to a failure of access control. An authenticated attacker can exploit this vulnerability to execute commands with higher-level permissions.", "edition": 1, "enchantments": {}, "hash": "b07f8017b38a98da557003fd3dafbe03ed9cde1abd0f4d59d0796ecfd14a8758", "hashmap": [{"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "6c93aa11ddec83545eccb5cb8e5e0225", "key": "description"}, {"hash": "6184d393052ca6da28295d5ba83c08b3", "key": "cvelist"}, {"hash": "5bf6375693ef920925e4a8f74351504c", "key": "modified"}, {"hash": "5ab398398c817de23174e62f618d261c", "key": "references"}, {"hash": "4024ccdff7f3921c87b0d1eac9337c0d", "key": "pluginID"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "56e7f058a16146cf09d1fad028202efc", "key": "title"}, {"hash": "f069c073b9c4178ba18fdc44a2b36fa6", "key": "published"}, {"hash": "d7bd5f553bb8dcc8c732be6a2ddd5170", "key": "href"}, {"hash": "67933a273737791ab6f71e29a2605c31", "key": "naslFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}, {"hash": "044f16d76ebe10546856801bdc04bcdd", "key": "sourceData"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=77337", "id": "HUAWEI-SA-20131228-02.NASL", "lastseen": "2016-09-26T17:25:26", "modified": "2015-11-18T00:00:00", "naslFamily": "Huawei Local Security Checks", "objectVersion": "1.2", "pluginID": "77337", "published": "2014-08-22T00:00:00", "references": ["http://www.nessus.org/u?898480dd"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77337);\n script_version(\"$Revision: 1.3 $\");\n script_cvs_date(\"$Date: 2015/11/18 21:03:57 $\");\n\n script_cve_id(\"CVE-2014-1688\");\n script_bugtraq_id(64634);\n script_osvdb_id(101637);\n\n script_name(english:\"Huawei CloudEngine Switch Security Bypass (HWPSIRT-2013-1256)\");\n script_summary(english:\"Checks the firmware version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by a security bypass vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is a Huawei switch running a firmware version that is\naffected by a security bypass vulnerability due to a failure of access\ncontrol. An authenticated attacker can exploit this vulnerability to\nexecute commands with higher-level permissions.\");\n # http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-323610.htm\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?898480dd\");\n script_set_attribute(attribute:\"solution\", value:\"Apply the relevant update referenced in the vendor advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/12/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/12/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:versatile_routing_platform\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.\");\n\n script_dependencies(\"huawei_vrp_version.nbin\");\n script_require_keys(\"Host/Huawei/VRP/Series\", \"Host/Huawei/VRP/Version\", \"Host/Huawei/VRP/Model\");\n\n exit(0);\n}\n\ninclude(\"huawei_version.inc\");\n\nmodel = get_kb_item_or_exit(\"Host/Huawei/VRP/Model\");\nseries = get_kb_item_or_exit(\"Host/Huawei/VRP/Series\");\nversion = get_kb_item_or_exit(\"Host/Huawei/VRP/Version\");\n\nreference = make_nested_list(\n make_array(\n \"series\", make_list(\"^CE[56]800$\"),\n \"checks\", make_nested_list(\n make_array(\n \"vuln\", \"V100R001C00SPC200\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n )\n )\n ),\n make_array(\n \"series\", make_list(\"^CE12800$\"),\n \"checks\", make_nested_list(\n make_array(\n \"vuln\", \"V100R001C00SPC200\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n ),\n make_array(\n \"vuln\", \"V100R001C01SPC100\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n )\n )\n )\n );\n\nhuawei_check_and_report(\n model:model,\n series:series,\n version:version,\n reference:reference,\n severity:SECURITY_HOLE\n);\n", "title": "Huawei CloudEngine Switch Security Bypass (HWPSIRT-2013-1256)", "type": "nessus", "viewCount": 0}, "differentElements": ["cpe"], "edition": 1, "lastseen": "2016-09-26T17:25:26"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:huawei:versatile_routing_platform"], "cvelist": ["CVE-2014-1688"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "The remote host is a Huawei switch running a firmware version that is affected by a security bypass vulnerability due to a failure of access control. An authenticated attacker can exploit this vulnerability to execute commands with higher-level permissions.", "edition": 5, "enchantments": {"dependencies": {"modified": "2019-02-21T01:22:19", "references": [{"idList": ["HUAWEI-SA-20131228-02"], "type": "huawei"}]}, "score": {"modified": "2019-02-21T01:22:19", "value": 0.9, "vector": "NONE"}}, "hash": "b982d77dc633a019607ed7b0686a5e2d3acf963c0291c05da11a6876e6faea73", "hashmap": [{"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "c8681f8a8396466c9c9a75673222faa1", "key": "sourceData"}, {"hash": "6c93aa11ddec83545eccb5cb8e5e0225", "key": "description"}, {"hash": "6184d393052ca6da28295d5ba83c08b3", "key": "cvelist"}, {"hash": "5ab398398c817de23174e62f618d261c", "key": "references"}, {"hash": "4024ccdff7f3921c87b0d1eac9337c0d", "key": "pluginID"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "56e7f058a16146cf09d1fad028202efc", "key": "title"}, {"hash": "8606595e54df223f5ce942d2262f3d36", "key": "cpe"}, {"hash": "f069c073b9c4178ba18fdc44a2b36fa6", "key": "published"}, {"hash": "d7bd5f553bb8dcc8c732be6a2ddd5170", "key": "href"}, {"hash": "f5e850f1985da305c7f9475708cd4d52", "key": "modified"}, {"hash": "67933a273737791ab6f71e29a2605c31", "key": "naslFamily"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=77337", "id": "HUAWEI-SA-20131228-02.NASL", "lastseen": "2019-02-21T01:22:19", "modified": "2018-07-12T00:00:00", "naslFamily": "Huawei Local Security Checks", "objectVersion": "1.3", "pluginID": "77337", "published": "2014-08-22T00:00:00", "references": ["http://www.nessus.org/u?898480dd"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77337);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2018/07/12 19:01:15\");\n\n script_cve_id(\"CVE-2014-1688\");\n script_bugtraq_id(64634);\n\n script_name(english:\"Huawei CloudEngine Switch Security Bypass (HWPSIRT-2013-1256)\");\n script_summary(english:\"Checks the firmware version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by a security bypass vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is a Huawei switch running a firmware version that is\naffected by a security bypass vulnerability due to a failure of access\ncontrol. An authenticated attacker can exploit this vulnerability to\nexecute commands with higher-level permissions.\");\n # http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-323610.htm\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?898480dd\");\n script_set_attribute(attribute:\"solution\", value:\"Apply the relevant update referenced in the vendor advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/12/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/12/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:versatile_routing_platform\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"huawei_vrp_version.nbin\");\n script_require_keys(\"Host/Huawei/VRP/Series\", \"Host/Huawei/VRP/Version\", \"Host/Huawei/VRP/Model\");\n\n exit(0);\n}\n\ninclude(\"huawei_version.inc\");\n\nmodel = get_kb_item_or_exit(\"Host/Huawei/VRP/Model\");\nseries = get_kb_item_or_exit(\"Host/Huawei/VRP/Series\");\nversion = get_kb_item_or_exit(\"Host/Huawei/VRP/Version\");\n\nreference = make_nested_list(\n make_array(\n \"series\", make_list(\"^CE[56]800$\"),\n \"checks\", make_nested_list(\n make_array(\n \"vuln\", \"V100R001C00SPC200\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n )\n )\n ),\n make_array(\n \"series\", make_list(\"^CE12800$\"),\n \"checks\", make_nested_list(\n make_array(\n \"vuln\", \"V100R001C00SPC200\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n ),\n make_array(\n \"vuln\", \"V100R001C01SPC100\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n )\n )\n )\n );\n\nhuawei_check_and_report(\n model:model,\n series:series,\n version:version,\n reference:reference,\n severity:SECURITY_HOLE\n);\n", "title": "Huawei CloudEngine Switch Security Bypass (HWPSIRT-2013-1256)", "type": "nessus", "viewCount": 0}, "differentElements": ["description", "reporter", "modified", "href"], "edition": 5, "lastseen": "2019-02-21T01:22:19"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:huawei:versatile_routing_platform"], "cvelist": ["CVE-2014-1688"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "The remote host is a Huawei switch running a firmware version that is\naffected by a security bypass vulnerability due to a failure of access\ncontrol. An authenticated attacker can exploit this vulnerability to\nexecute commands with higher-level permissions.", "edition": 4, "enchantments": {"dependencies": {"modified": "2019-01-16T20:19:36", "references": [{"idList": ["HUAWEI-SA-20131228-02"], "type": "huawei"}]}, "score": {"value": 7.5, "vector": "NONE"}}, "hash": "17ce4c8a608199283c7a6a705b66a41d8ec590d1401bd8ea08d8604f672b77ae", "hashmap": [{"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "c8681f8a8396466c9c9a75673222faa1", "key": "sourceData"}, {"hash": "6184d393052ca6da28295d5ba83c08b3", "key": "cvelist"}, {"hash": "5ab398398c817de23174e62f618d261c", "key": "references"}, {"hash": "4024ccdff7f3921c87b0d1eac9337c0d", "key": "pluginID"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "56e7f058a16146cf09d1fad028202efc", "key": "title"}, {"hash": "8606595e54df223f5ce942d2262f3d36", "key": "cpe"}, {"hash": "f069c073b9c4178ba18fdc44a2b36fa6", "key": "published"}, {"hash": "d7bd5f553bb8dcc8c732be6a2ddd5170", "key": "href"}, {"hash": "f5e850f1985da305c7f9475708cd4d52", "key": "modified"}, {"hash": "401069c6c06e1dea75f97dd0d2dbd215", "key": "description"}, {"hash": "67933a273737791ab6f71e29a2605c31", "key": "naslFamily"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=77337", "id": "HUAWEI-SA-20131228-02.NASL", "lastseen": "2019-01-16T20:19:36", "modified": "2018-07-12T00:00:00", "naslFamily": "Huawei Local Security Checks", "objectVersion": "1.3", "pluginID": "77337", "published": "2014-08-22T00:00:00", "references": ["http://www.nessus.org/u?898480dd"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77337);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2018/07/12 19:01:15\");\n\n script_cve_id(\"CVE-2014-1688\");\n script_bugtraq_id(64634);\n\n script_name(english:\"Huawei CloudEngine Switch Security Bypass (HWPSIRT-2013-1256)\");\n script_summary(english:\"Checks the firmware version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by a security bypass vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is a Huawei switch running a firmware version that is\naffected by a security bypass vulnerability due to a failure of access\ncontrol. An authenticated attacker can exploit this vulnerability to\nexecute commands with higher-level permissions.\");\n # http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-323610.htm\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?898480dd\");\n script_set_attribute(attribute:\"solution\", value:\"Apply the relevant update referenced in the vendor advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/12/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/12/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:versatile_routing_platform\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"huawei_vrp_version.nbin\");\n script_require_keys(\"Host/Huawei/VRP/Series\", \"Host/Huawei/VRP/Version\", \"Host/Huawei/VRP/Model\");\n\n exit(0);\n}\n\ninclude(\"huawei_version.inc\");\n\nmodel = get_kb_item_or_exit(\"Host/Huawei/VRP/Model\");\nseries = get_kb_item_or_exit(\"Host/Huawei/VRP/Series\");\nversion = get_kb_item_or_exit(\"Host/Huawei/VRP/Version\");\n\nreference = make_nested_list(\n make_array(\n \"series\", make_list(\"^CE[56]800$\"),\n \"checks\", make_nested_list(\n make_array(\n \"vuln\", \"V100R001C00SPC200\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n )\n )\n ),\n make_array(\n \"series\", make_list(\"^CE12800$\"),\n \"checks\", make_nested_list(\n make_array(\n \"vuln\", \"V100R001C00SPC200\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n ),\n make_array(\n \"vuln\", \"V100R001C01SPC100\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n )\n )\n )\n );\n\nhuawei_check_and_report(\n model:model,\n series:series,\n version:version,\n reference:reference,\n severity:SECURITY_HOLE\n);\n", "title": "Huawei CloudEngine Switch Security Bypass (HWPSIRT-2013-1256)", "type": "nessus", "viewCount": 0}, "differentElements": ["description"], "edition": 4, "lastseen": "2019-01-16T20:19:36"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:huawei:versatile_routing_platform"], "cvelist": ["CVE-2014-1688"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "The remote host is a Huawei switch running a firmware version that is affected by a security bypass vulnerability due to a failure of access control. An authenticated attacker can exploit this vulnerability to execute commands with higher-level permissions.", "edition": 2, "enchantments": {"score": {"value": 7.5, "vector": "NONE"}}, "hash": "3e3a9180c145228d81443385dad1dbdac1ca57005356c64864f5920289b66e44", "hashmap": [{"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "6c93aa11ddec83545eccb5cb8e5e0225", "key": "description"}, {"hash": "6184d393052ca6da28295d5ba83c08b3", "key": "cvelist"}, {"hash": "5bf6375693ef920925e4a8f74351504c", "key": "modified"}, {"hash": "5ab398398c817de23174e62f618d261c", "key": "references"}, {"hash": "4024ccdff7f3921c87b0d1eac9337c0d", "key": "pluginID"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "56e7f058a16146cf09d1fad028202efc", "key": "title"}, {"hash": "8606595e54df223f5ce942d2262f3d36", "key": "cpe"}, {"hash": "f069c073b9c4178ba18fdc44a2b36fa6", "key": "published"}, {"hash": "d7bd5f553bb8dcc8c732be6a2ddd5170", "key": "href"}, {"hash": "67933a273737791ab6f71e29a2605c31", "key": "naslFamily"}, {"hash": "044f16d76ebe10546856801bdc04bcdd", "key": "sourceData"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=77337", "id": "HUAWEI-SA-20131228-02.NASL", "lastseen": "2017-10-29T13:41:05", "modified": "2015-11-18T00:00:00", "naslFamily": "Huawei Local Security Checks", "objectVersion": "1.3", "pluginID": "77337", "published": "2014-08-22T00:00:00", "references": ["http://www.nessus.org/u?898480dd"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77337);\n script_version(\"$Revision: 1.3 $\");\n script_cvs_date(\"$Date: 2015/11/18 21:03:57 $\");\n\n script_cve_id(\"CVE-2014-1688\");\n script_bugtraq_id(64634);\n script_osvdb_id(101637);\n\n script_name(english:\"Huawei CloudEngine Switch Security Bypass (HWPSIRT-2013-1256)\");\n script_summary(english:\"Checks the firmware version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by a security bypass vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is a Huawei switch running a firmware version that is\naffected by a security bypass vulnerability due to a failure of access\ncontrol. An authenticated attacker can exploit this vulnerability to\nexecute commands with higher-level permissions.\");\n # http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-323610.htm\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?898480dd\");\n script_set_attribute(attribute:\"solution\", value:\"Apply the relevant update referenced in the vendor advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/12/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/12/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:versatile_routing_platform\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.\");\n\n script_dependencies(\"huawei_vrp_version.nbin\");\n script_require_keys(\"Host/Huawei/VRP/Series\", \"Host/Huawei/VRP/Version\", \"Host/Huawei/VRP/Model\");\n\n exit(0);\n}\n\ninclude(\"huawei_version.inc\");\n\nmodel = get_kb_item_or_exit(\"Host/Huawei/VRP/Model\");\nseries = get_kb_item_or_exit(\"Host/Huawei/VRP/Series\");\nversion = get_kb_item_or_exit(\"Host/Huawei/VRP/Version\");\n\nreference = make_nested_list(\n make_array(\n \"series\", make_list(\"^CE[56]800$\"),\n \"checks\", make_nested_list(\n make_array(\n \"vuln\", \"V100R001C00SPC200\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n )\n )\n ),\n make_array(\n \"series\", make_list(\"^CE12800$\"),\n \"checks\", make_nested_list(\n make_array(\n \"vuln\", \"V100R001C00SPC200\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n ),\n make_array(\n \"vuln\", \"V100R001C01SPC100\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n )\n )\n )\n );\n\nhuawei_check_and_report(\n model:model,\n series:series,\n version:version,\n reference:reference,\n severity:SECURITY_HOLE\n);\n", "title": "Huawei CloudEngine Switch Security Bypass (HWPSIRT-2013-1256)", "type": "nessus", "viewCount": 0}, "differentElements": ["modified", "sourceData"], "edition": 2, "lastseen": "2017-10-29T13:41:05"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:huawei:versatile_routing_platform"], "cvelist": ["CVE-2014-1688"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "The remote host is a Huawei switch running a firmware version that is\naffected by a security bypass vulnerability due to a failure of access\ncontrol. An authenticated attacker can exploit this vulnerability to\nexecute commands with higher-level permissions.", "edition": 6, "enchantments": {"dependencies": {"modified": "2019-10-28T20:31:17", "references": [{"idList": ["HUAWEI-SA-20131228-02"], "type": "huawei"}]}, "score": {"modified": "2019-10-28T20:31:17", "value": 0.9, "vector": "NONE"}}, "hash": "5708ab2f1640cebe0a837b5b58b7d5121d5c0c4f5ac0954a35f86b3bae95478f", "hashmap": [{"hash": "eebc0e5cad997220d136d9e0c6386556", "key": "reporter"}, {"hash": "c8681f8a8396466c9c9a75673222faa1", "key": "sourceData"}, {"hash": "6184d393052ca6da28295d5ba83c08b3", "key": "cvelist"}, {"hash": "5ab398398c817de23174e62f618d261c", "key": "references"}, {"hash": "49856073fcad48405c6bbc67cc2031ac", "key": "href"}, {"hash": "4024ccdff7f3921c87b0d1eac9337c0d", "key": "pluginID"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "0bafb6325bcaf483a25404f785191cc5", "key": "modified"}, {"hash": "56e7f058a16146cf09d1fad028202efc", "key": "title"}, {"hash": "8606595e54df223f5ce942d2262f3d36", "key": "cpe"}, {"hash": "f069c073b9c4178ba18fdc44a2b36fa6", "key": "published"}, {"hash": "401069c6c06e1dea75f97dd0d2dbd215", "key": "description"}, {"hash": "67933a273737791ab6f71e29a2605c31", "key": "naslFamily"}], "history": [], "href": "https://www.tenable.com/plugins/nessus/77337", "id": "HUAWEI-SA-20131228-02.NASL", "lastseen": "2019-10-28T20:31:17", "modified": "2019-10-02T00:00:00", "naslFamily": "Huawei Local Security Checks", "objectVersion": "1.3", "pluginID": "77337", "published": "2014-08-22T00:00:00", "references": ["http://www.nessus.org/u?898480dd"], "reporter": "This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77337);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2018/07/12 19:01:15\");\n\n script_cve_id(\"CVE-2014-1688\");\n script_bugtraq_id(64634);\n\n script_name(english:\"Huawei CloudEngine Switch Security Bypass (HWPSIRT-2013-1256)\");\n script_summary(english:\"Checks the firmware version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by a security bypass vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is a Huawei switch running a firmware version that is\naffected by a security bypass vulnerability due to a failure of access\ncontrol. An authenticated attacker can exploit this vulnerability to\nexecute commands with higher-level permissions.\");\n # http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-323610.htm\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?898480dd\");\n script_set_attribute(attribute:\"solution\", value:\"Apply the relevant update referenced in the vendor advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/12/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/12/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:versatile_routing_platform\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"huawei_vrp_version.nbin\");\n script_require_keys(\"Host/Huawei/VRP/Series\", \"Host/Huawei/VRP/Version\", \"Host/Huawei/VRP/Model\");\n\n exit(0);\n}\n\ninclude(\"huawei_version.inc\");\n\nmodel = get_kb_item_or_exit(\"Host/Huawei/VRP/Model\");\nseries = get_kb_item_or_exit(\"Host/Huawei/VRP/Series\");\nversion = get_kb_item_or_exit(\"Host/Huawei/VRP/Version\");\n\nreference = make_nested_list(\n make_array(\n \"series\", make_list(\"^CE[56]800$\"),\n \"checks\", make_nested_list(\n make_array(\n \"vuln\", \"V100R001C00SPC200\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n )\n )\n ),\n make_array(\n \"series\", make_list(\"^CE12800$\"),\n \"checks\", make_nested_list(\n make_array(\n \"vuln\", \"V100R001C00SPC200\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n ),\n make_array(\n \"vuln\", \"V100R001C01SPC100\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n )\n )\n )\n );\n\nhuawei_check_and_report(\n model:model,\n series:series,\n version:version,\n reference:reference,\n severity:SECURITY_HOLE\n);\n", "title": "Huawei CloudEngine Switch Security Bypass (HWPSIRT-2013-1256)", "type": "nessus", "viewCount": 0}, "differentElements": ["modified"], "edition": 6, "lastseen": "2019-10-28T20:31:17"}], "edition": 7, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "8606595e54df223f5ce942d2262f3d36"}, {"key": "cvelist", "hash": "6184d393052ca6da28295d5ba83c08b3"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "401069c6c06e1dea75f97dd0d2dbd215"}, {"key": "href", "hash": "49856073fcad48405c6bbc67cc2031ac"}, {"key": "modified", "hash": "abcf9266f425f12dda38f529cd4a94bc"}, {"key": "naslFamily", "hash": "67933a273737791ab6f71e29a2605c31"}, {"key": "pluginID", "hash": "4024ccdff7f3921c87b0d1eac9337c0d"}, {"key": "published", "hash": "f069c073b9c4178ba18fdc44a2b36fa6"}, {"key": "references", "hash": "5ab398398c817de23174e62f618d261c"}, {"key": "reporter", "hash": "eebc0e5cad997220d136d9e0c6386556"}, {"key": "sourceData", "hash": "c8681f8a8396466c9c9a75673222faa1"}, {"key": "title", "hash": "56e7f058a16146cf09d1fad028202efc"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "e689336160fb8c1cf8c4f987fdaf13b3833f958527b7dca261c89515137352df", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "huawei", "idList": ["HUAWEI-SA-20131228-02"]}], "modified": "2019-11-01T02:47:27"}, "score": {"value": 0.9, "vector": "NONE", "modified": "2019-11-01T02:47:27"}, "vulnersScore": 0.9}, "objectVersion": "1.3", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(77337);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2018/07/12 19:01:15\");\n\n script_cve_id(\"CVE-2014-1688\");\n script_bugtraq_id(64634);\n\n script_name(english:\"Huawei CloudEngine Switch Security Bypass (HWPSIRT-2013-1256)\");\n script_summary(english:\"Checks the firmware version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by a security bypass vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is a Huawei switch running a firmware version that is\naffected by a security bypass vulnerability due to a failure of access\ncontrol. An authenticated attacker can exploit this vulnerability to\nexecute commands with higher-level permissions.\");\n # http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-323610.htm\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?898480dd\");\n script_set_attribute(attribute:\"solution\", value:\"Apply the relevant update referenced in the vendor advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/12/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/12/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:versatile_routing_platform\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"huawei_vrp_version.nbin\");\n script_require_keys(\"Host/Huawei/VRP/Series\", \"Host/Huawei/VRP/Version\", \"Host/Huawei/VRP/Model\");\n\n exit(0);\n}\n\ninclude(\"huawei_version.inc\");\n\nmodel = get_kb_item_or_exit(\"Host/Huawei/VRP/Model\");\nseries = get_kb_item_or_exit(\"Host/Huawei/VRP/Series\");\nversion = get_kb_item_or_exit(\"Host/Huawei/VRP/Version\");\n\nreference = make_nested_list(\n make_array(\n \"series\", make_list(\"^CE[56]800$\"),\n \"checks\", make_nested_list(\n make_array(\n \"vuln\", \"V100R001C00SPC200\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n )\n )\n ),\n make_array(\n \"series\", make_list(\"^CE12800$\"),\n \"checks\", make_nested_list(\n make_array(\n \"vuln\", \"V100R001C00SPC200\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n ),\n make_array(\n \"vuln\", \"V100R001C01SPC100\",\n \"fix\", \"V100R002C00SPC200 / V100R001SPH001\",\n \"type\", HV_CHECK_EARLIER\n )\n )\n )\n );\n\nhuawei_check_and_report(\n model:model,\n series:series,\n version:version,\n reference:reference,\n severity:SECURITY_HOLE\n);\n", "naslFamily": "Huawei Local Security Checks", "pluginID": "77337", "cpe": ["cpe:/o:huawei:versatile_routing_platform"], "scheme": null}
{"huawei": [{"lastseen": "2019-02-01T18:01:20", "bulletinFamily": "software", "description": "Products\n\nSwitches\nRouters\nWLAN\nServers\nSee All\n\n\n\nSolutions\n\nCloud Data Center\nEnterprise Networking\nWireless Private Network\nSolutions by Industry\nSee All\n\n\n\nServices\n\nTraining and Certification\nICT Lifecycle Services\nTechnology Services\nIndustry Solution Services\nSee All\n\n\n\nSee all offerings at e.huawei.com\n\n\n\nNeed Support ?\n\nProduct Support\nSoftware Download\nCommunity\nTools\n\nGo to Full Support", "modified": "2014-02-11T00:00:00", "published": "2013-12-28T00:00:00", "id": "HUAWEI-SA-20131228-02", "href": "https://www.huawei.com/en/psirt/security-advisories/2014/hw-323610", "title": "Security Advisory-A Vulnerability on the HWTACACS Authorization Module of the CloudEngine", "type": "huawei", "cvss": {"score": 0.0, "vector": "NONE"}}]}