Lucene search

K

Cloudengine 7800 Firmware Security Vulnerabilities - 2020

cve
cve

CVE-2020-1870

There is a denial of service vulnerability in some Huawei products. Due to improper memory management, memory leakage may occur in some special cases. Attackers can perform a series of operations to exploit this vulnerability. Successful exploit may cause a denial of service. Affected product versi...

7.5CVSS

7.4AI Score

0.001EPSS

2020-05-29 08:15 PM
65
cve
cve

CVE-2020-9094

There is an out of bound read vulnerability in some verisons of Huawei CloudEngine product. A module does not deal with specific message properly. Attackers can exploit this vulnerability by sending malicious packet. This can lead to denial of service.

7.5CVSS

7.3AI Score

0.001EPSS

2020-12-29 06:15 PM
24
6
cve
cve

CVE-2020-9102

There is a information leak vulnerability in some Huawei products, and it could allow a local attacker to get information. The vulnerability is due to the improper management of the username. An attacker with the ability to access the device and cause the username information leak. Affected product...

3.3CVSS

3.8AI Score

0.0004EPSS

2020-07-17 11:15 PM
29
cve
cve

CVE-2020-9124

There is a memory leak vulnerability in some versions of Huawei CloudEngine product. An unauthenticated, remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause memory leak.

7.5CVSS

7.5AI Score

0.002EPSS

2020-12-29 06:15 PM
27
6
cve
cve

CVE-2020-9137

There is a privilege escalation vulnerability in some versions of CloudEngine 12800,CloudEngine 5800,CloudEngine 6800 and CloudEngine 7800. Due to insufficient input validation, a local attacker with high privilege may execute some specially crafted scripts in the affected products. Successful expl...

6.7CVSS

6.5AI Score

0.0004EPSS

2020-12-24 04:15 PM
45
4
cve
cve

CVE-2020-9207

There is an improper authentication vulnerability in some verisons of Huawei CloudEngine product. A module does not verify the input file properly. Attackers can exploit this vulnerability by crafting malicious files to bypass current verification mechanism. This can compromise normal service.

7.8CVSS

7.7AI Score

0.001EPSS

2020-12-29 06:15 PM
27
4