DoS Vulnerability in Huawei Firewall Products, caused by insufficient input validation, allowing remote attackers to send malformed IKE packets, and causing device restart
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | CVE-2017-8167 | 22 Nov 201719:00 | – | cvelist |
![]() | CVE-2017-8167 | 22 Nov 201719:29 | – | cve |
![]() | Security Advisory - DoS Vulnerability in Huawei Firewall Products | 25 Oct 201700:00 | – | huawei |
![]() | Design/Logic Flaw | 22 Nov 201719:29 | – | prion |
![]() | CVE-2017-8167 | 22 Nov 201719:29 | – | nvd |
# Copyright (C) 2020 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
CPE = "cpe:/o:huawei:usg9500_firmware";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.143969");
script_version("2021-08-17T12:00:57+0000");
script_tag(name:"last_modification", value:"2021-08-17 12:00:57 +0000 (Tue, 17 Aug 2021)");
script_tag(name:"creation_date", value:"2020-05-26 02:01:05 +0000 (Tue, 26 May 2020)");
script_tag(name:"cvss_base", value:"7.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2017-12-12 18:10:00 +0000 (Tue, 12 Dec 2017)");
script_cve_id("CVE-2017-8167");
script_tag(name:"qod_type", value:"remote_banner");
script_tag(name:"solution_type", value:"VendorFix");
script_name("Huawei Data Communication: DoS Vulnerability in Huawei Firewall Products (huawei-sa-20171025-01-firewall)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2020 Greenbone Networks GmbH");
script_family("Huawei");
script_dependencies("gb_huawei_vrp_network_device_consolidation.nasl");
script_mandatory_keys("huawei/vrp/detected");
script_tag(name:"summary", value:"There is a DoS vulnerability in some Huawei firewall products.");
script_tag(name:"insight", value:"There is a DoS vulnerability in some Huawei firewall products. Due to insufficient input validation, a remote attacker who controls the peer device could exploit the vulnerability by sending malformed IKE packets to the target device. Successful exploit of the vulnerability could cause the device to restart. (Vulnerability ID: HWPSIRT-2017-07147)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-8167.Huawei has released software updates to fix this vulnerability. This advisory is available in the linked references.");
script_tag(name:"impact", value:"Successful exploit of the vulnerability could cause the device to restart.");
script_tag(name:"affected", value:"Secospace USG6600 versions V500R001C60SPC100PWE");
script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_xref(name:"URL", value:"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if (!version = get_app_version(cpe: CPE, nofork: TRUE))
exit(0);
version = toupper(version);
if (version =~ "^V500R001C50") {
report = report_fixed_ver(installed_version: version, fixed_version: "V500R001C60SPC200");
security_message(port: 0, data: report);
exit(0);
}
exit(99);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo