-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
HP/H3C and Huawei SNMP Weak Access to Critical Data
===================================================
http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html
Overview
- - --------
HP/H3C and Huawei networking equipment suffers from a serious weakness
in regards to they're handling of Systems Network Management Protocol
(SNMP) requests for protected h3c-user.mib and hh3c-user.mib objects.
Identifiers
- - -----------
US-CERT VU#225404
CVE-2012-3268
Vendor release
- - --------------
HP/H3C:
https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03515685&ac.admitted=1350939600802.876444892.492883150
Huawei: In the works
Researcher
- - ----------
Kurt Grutzmacher
grutz <at> jingojango dot net
http://grutztopia.jingojango.net/
twitter: @grutz
Details
- - -------
Huawei/H3C have two OIDs, 'old' and 'new':
old: 1.3.6.1.4.1.2011.10
new: 1.3.6.1.4.1.25506
Most devices support both formats.
The MIBs h3c-user.mib and hh3c-user.mib, for the purpose of this
document, will be referred to as (h)h3c-user.mib. This MIB defines the
internal table and objects to "Manage configuration and Monitor running
state for userlog feature."
This means there are some cool objects with data in this MIB penetration
testers or malicious actors would want to get their dirty little hands
on. Most objects are only accessible with the read/write community string.
In the revision history of (h)h3c-user.mib, version 2.0 modified the
MAX-ACCESS from read-only to read-create the following objects within
the (h)h3cUserInfoEntry sequence:
(h)h3cUserName
(h)h3cUserPassword
(h)h3cAuthMode
(h)h3cUserLevel
The purpose of these objects are to provide the locally configured users
to those with a valid SNMP community. After the change only those with
the read-write community string should have access, however this was not
the case and the code still retained the earlier access of read-only.
So if you have the SNMP public community string then you have the
ability to view these entries.
Why this is impactful
- - ---------------------
The (h)h3cUserPassword is presented in one of three formats as defined
in the (h)h3cAuthMode object and mirrors how passwords are stored in the
device configuration:
0 -- password simple, meaning cleartext
7 -- password cipher, meaning ciphertext
9 -- password sha-256, meaning one-way sha-256 hash
SHA-256 is a recent addition and is not supported on all devices yet.
On top of this the (h)h3cUserLevel can be 0 to 3 where 0 is limited
access and 3 is full access.
Globbing some users
- - -------------------
You must have an SNMP read-only or read-write string and access to the
SNMP port (udp/161) for this to work:
$ snmpwalk ?c public ?v 1 $IP 1.3.6.1.4.1.2011.10.2.12.1.1.1
or
$ snmpwalk ?c public ?v 1 $IP 1.3.6.1.4.1.25506.2.12.1.1.1
Weaponizing
- - -----------
Files relevant to this disclosure:
hh3c-localuser-enum.rb - Metasploit auxiliary scanner module
snmp-h3c-login.nse - Nmap Scripting Engine module
These will soon be posted to https://github.com/grutz/h3c-pt-tools and
requested to be added to each tool.
Mitigation
- - ----------
By itself this is already bad but most users who do any of the following
may already be protected:
1. Use complex SNMP community strings or disable SNMPv1
2. Have disabled the mib entries for (h)h3c-user
3. Block SNMP using access controls or firewalls
4. Do not define local users, use RADIUS or TACACS+
More specific routines can be found in the vendor's release.
Why this is a bigger problem
- - ----------------------------
People make poor choices. They like to think their equipment won't rat
them out so they use cleartext passwords on networking equipment.
The cipher is an interesting one because it's basically an unknown...
What, you think the only thing I had to share at Toorcon was SNMP and
some cleartext credentials?
Timeline
- - --------
June-ish 2012: Research begins after seeing something cool on a
penetration test
August 6, 2012: Contacted US-CERT to coordinate vendor disclosure, VU#225404
September 5, 2012: No response from H3C, contacted US-CERT again
September 6, 2012: H3C (through US-CERT) requests more time, I state
intention to present findings at Toorcon (Oct 19/20, 2012) or disclose
if talk not accepted.
September 18, 2012: Approved for Toorcon! Information goes up not long
after on Toorcon website.
September 18-October 16, 2012: Build slides, work on tools, no contact
with US-CERT or vendors.
October 16, 2012: HP contacts me directly asking that I not present this
information at Toorcon
October 18, 2012: Publicly state agreement to cancel the Toorcon talk
October 22, 2012: HP discloses! What what? Why bother putting any
pressure not to give the talk if you're gonna give everything out 2 days
later?
October 23, 2012: So I publish.
- --
- - grutz;
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/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=dyEA
-----END PGP SIGNATURE-----
{"id": "SECURITYVULNS:DOC:28680", "vendorId": null, "type": "securityvulns", "bulletinFamily": "software", "title": "HP/H3C and Huawei SNMP Weak Access to Critical Data", "description": "\r\n\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nHP/H3C and Huawei SNMP Weak Access to Critical Data\r\n===================================================\r\n\r\nhttp://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html\r\n\r\nOverview\r\n- - --------\r\n\r\nHP/H3C and Huawei networking equipment suffers from a serious weakness\r\nin regards to they're handling of Systems Network Management Protocol\r\n(SNMP) requests for protected h3c-user.mib and hh3c-user.mib objects.\r\n\r\n\r\nIdentifiers\r\n- - -----------\r\n\r\n US-CERT VU#225404\r\n CVE-2012-3268\r\n\r\n\r\nVendor release\r\n- - --------------\r\n\r\n HP/H3C:\r\nhttps://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03515685&ac.admitted=1350939600802.876444892.492883150\r\n\r\n Huawei: In the works\r\n\r\n\r\nResearcher\r\n- - ----------\r\n\r\n Kurt Grutzmacher\r\n grutz <at> jingojango dot net\r\n http://grutztopia.jingojango.net/\r\n twitter: @grutz\r\n\r\n\r\nDetails\r\n- - -------\r\n\r\nHuawei/H3C have two OIDs, 'old' and 'new':\r\n\r\n old: 1.3.6.1.4.1.2011.10\r\n new: 1.3.6.1.4.1.25506\r\n\r\nMost devices support both formats.\r\n\r\nThe MIBs h3c-user.mib and hh3c-user.mib, for the purpose of this\r\ndocument, will be referred to as (h)h3c-user.mib. This MIB defines the\r\ninternal table and objects to "Manage configuration and Monitor running\r\nstate for userlog feature."\r\n\r\nThis means there are some cool objects with data in this MIB penetration\r\ntesters or malicious actors would want to get their dirty little hands\r\non. Most objects are only accessible with the read/write community string.\r\n\r\nIn the revision history of (h)h3c-user.mib, version 2.0 modified the\r\nMAX-ACCESS from read-only to read-create the following objects within\r\nthe (h)h3cUserInfoEntry sequence:\r\n\r\n (h)h3cUserName\r\n (h)h3cUserPassword\r\n (h)h3cAuthMode\r\n (h)h3cUserLevel\r\n\r\nThe purpose of these objects are to provide the locally configured users\r\nto those with a valid SNMP community. After the change only those with\r\nthe read-write community string should have access, however this was not\r\nthe case and the code still retained the earlier access of read-only.\r\n\r\nSo if you have the SNMP public community string then you have the\r\nability to view these entries.\r\n\r\n\r\nWhy this is impactful\r\n- - ---------------------\r\n\r\nThe (h)h3cUserPassword is presented in one of three formats as defined\r\nin the (h)h3cAuthMode object and mirrors how passwords are stored in the\r\ndevice configuration:\r\n\r\n 0 -- password simple, meaning cleartext\r\n 7 -- password cipher, meaning ciphertext\r\n 9 -- password sha-256, meaning one-way sha-256 hash\r\n\r\nSHA-256 is a recent addition and is not supported on all devices yet.\r\n\r\nOn top of this the (h)h3cUserLevel can be 0 to 3 where 0 is limited\r\naccess and 3 is full access.\r\n\r\n\r\nGlobbing some users\r\n- - -------------------\r\n\r\nYou must have an SNMP read-only or read-write string and access to the\r\nSNMP port (udp/161) for this to work:\r\n\r\n $ snmpwalk ?c public ?v 1 $IP 1.3.6.1.4.1.2011.10.2.12.1.1.1\r\n\r\nor\r\n\r\n $ snmpwalk ?c public ?v 1 $IP 1.3.6.1.4.1.25506.2.12.1.1.1\r\n\r\n\r\nWeaponizing\r\n- - -----------\r\n\r\nFiles relevant to this disclosure:\r\n\r\n hh3c-localuser-enum.rb - Metasploit auxiliary scanner module\r\n snmp-h3c-login.nse - Nmap Scripting Engine module\r\n\r\nThese will soon be posted to https://github.com/grutz/h3c-pt-tools and\r\nrequested to be added to each tool.\r\n\r\n\r\nMitigation\r\n- - ----------\r\n\r\nBy itself this is already bad but most users who do any of the following\r\nmay already be protected:\r\n\r\n 1. Use complex SNMP community strings or disable SNMPv1\r\n 2. Have disabled the mib entries for (h)h3c-user\r\n 3. Block SNMP using access controls or firewalls\r\n 4. Do not define local users, use RADIUS or TACACS+\r\n\r\nMore specific routines can be found in the vendor's release.\r\n\r\n\r\nWhy this is a bigger problem\r\n- - ----------------------------\r\n\r\nPeople make poor choices. They like to think their equipment won't rat\r\nthem out so they use cleartext passwords on networking equipment.\r\n\r\nThe cipher is an interesting one because it's basically an unknown...\r\nWhat, you think the only thing I had to share at Toorcon was SNMP and\r\nsome cleartext credentials?\r\n\r\n\r\nTimeline\r\n- - --------\r\n\r\nJune-ish 2012: Research begins after seeing something cool on a\r\npenetration test\r\n\r\nAugust 6, 2012: Contacted US-CERT to coordinate vendor disclosure, VU#225404\r\n\r\nSeptember 5, 2012: No response from H3C, contacted US-CERT again\r\n\r\nSeptember 6, 2012: H3C (through US-CERT) requests more time, I state\r\nintention to present findings at Toorcon (Oct 19/20, 2012) or disclose\r\nif talk not accepted.\r\n\r\nSeptember 18, 2012: Approved for Toorcon! Information goes up not long\r\nafter on Toorcon website.\r\n\r\nSeptember 18-October 16, 2012: Build slides, work on tools, no contact\r\nwith US-CERT or vendors.\r\n\r\nOctober 16, 2012: HP contacts me directly asking that I not present this\r\ninformation at Toorcon\r\n\r\nOctober 18, 2012: Publicly state agreement to cancel the Toorcon talk\r\n\r\nOctober 22, 2012: HP discloses! What what? Why bother putting any\r\npressure not to give the talk if you're gonna give everything out 2 days\r\nlater?\r\n\r\nOctober 23, 2012: So I publish.\r\n\r\n \r\n- -- \r\n- - grutz;\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.12 (Darwin)\r\nComment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/\r\n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\r\nL4seBjeqC8ciVhQZa7RZ\r\n=dyEA\r\n-----END PGP SIGNATURE-----\r\n", "published": "2012-10-28T00:00:00", "modified": "2012-10-28T00:00:00", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "cvss2": {}, "cvss3": {}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28680", "reporter": "Securityvulns", "references": [], "cvelist": ["CVE-2012-3268"], "immutableFields": [], "lastseen": "2018-08-31T11:10:46", "viewCount": 136, "enchantments": {"score": {"value": -0.5, "vector": "NONE"}, "dependencies": {"references": [{"type": "cert", "idList": ["VU:225404"]}, {"type": "cve", "idList": ["CVE-2012-3268"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20121025-01"]}, {"type": "nessus", "idList": ["SNMP_H3C_INFO_LEAK.NASL"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:28681", "SECURITYVULNS:VULN:12667"]}]}, "backreferences": {"references": [{"type": "cert", "idList": ["VU:225404"]}, {"type": "cve", "idList": ["CVE-2012-3268"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20121025-01"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12667"]}]}, "exploitation": null, "affected_software": {"major_version": []}, "epss": [{"cve": "CVE-2012-3268", "epss": "0.002850000", "percentile": "0.638040000", "modified": "2023-03-19"}], "vulnersScore": -0.5}, "_state": {"dependencies": 1678962961, "score": 1678963748, "affected_software_major_version": 0, "epss": 1679323282}, "_internal": {"score_hash": "faf935b9d00667a4a7f5739d1f58cf18"}, "sourceData": "", "affectedSoftware": [], "appercut": {}, "exploitpack": {}, "hackapp": {}, "toolHref": "", "w3af": {}}
{"securityvulns": [{"lastseen": "2018-08-31T11:10:46", "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nNote: the current version of the following document is available here:\r\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\r\ndocDisplay?docId=emr_na-c03515685\r\n\r\nSUPPORT COMMUNICATION - SECURITY BULLETIN\r\n\r\nDocument ID: c03515685\r\nVersion: 2\r\n\r\nHPSBHF02819 SSRT100920 rev.2 - HP, 3COM, and H3C Routers & Switches, Remote\r\nDisclosure of Information\r\n\r\nNOTICE: The information in this Security Bulletin should be acted upon as\r\nsoon as possible.\r\n\r\nRelease Date: 2012-10-25\r\nLast Updated: 2012-10-25\r\n\r\nPotential Security Impact: Remote disclosure of information\r\n\r\nSource: Hewlett-Packard Company, HP Software Security Response Team\r\n\r\nVULNERABILITY SUMMARY\r\nPotential security vulnerabilities have been identified with HP, 3COM, and\r\nH3C routers and switches. The vulnerabilities could be remotely exploited\r\nresulting in disclosure of information.\r\n\r\nFor more information, refer to CERT VU#225404 on the CERT website.\r\n\r\nReferences: SSRT100962, CVE-2012-3268, CERT VU#225404\r\n\r\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.\r\nVendor\r\n Product Name\r\n Product Number\r\n\r\nHP\r\n 10500/7500 Advanced VPN Firewall Module\r\n JD249A\r\n\r\nH3C\r\n S7500E SecBlade VPN Firewall Module\r\n 0231A832, LSQ1FWBSC0\r\n\r\nHP\r\n 10504 Switch Chassis\r\n JC613A\r\n\r\nHP\r\n 10508 Switch Chassis\r\n JC612A\r\n\r\nHP\r\n 10508-V Switch Chassis\r\n JC611A\r\n\r\nHP\r\n 10512 Switch Chassis\r\n JC748A\r\n\r\nHP\r\n 12500 VPN Firewall Module\r\n JC635A\r\n\r\nHP\r\n 12508 DC Switch Chassis\r\n JC652A\r\n\r\nHP\r\n 12508 Switch Chassis\r\n JC086A\r\n\r\nH3C\r\n S12508 Chassis\r\n 0235A38N\r\n\r\nHP\r\n 12508 Switch Chassis\r\n JF431A\r\n\r\nHP\r\n A12508 Switch Chassis\r\n\r\nH3C\r\n S12508 Chassis\r\n 0235A0E6\r\n\r\nHP\r\n 12508 Switch Chassis\r\n JF431B\r\n\r\nHP\r\n A12508 Switch Chassis\r\n\r\nH3C\r\n S12508 (AC-1) Routing Switch\r\n 0235A0GE\r\n\r\nHP\r\n 12508 Switch Chassis\r\n JF431C\r\n\r\nHP\r\n 12518 DC Switch Chassis\r\n JC653A\r\n\r\nHP\r\n 12518 DC Switch Chassis\r\n JC653A\r\n\r\nHP\r\n 12518 Switch Chassis\r\n JC085A\r\n\r\nHP\r\n A12518 Switch Chassis\r\n\r\nH3C\r\n S12518 Chassis\r\n 0235A38M\r\n\r\nHP\r\n 12518 Switch Chassis\r\n JF430A\r\n\r\nHP\r\n A12518 Switch Chassis\r\n\r\nH3C\r\n S12518 Chassis\r\n 0235A0E7\r\n\r\nHP\r\n 12518 Switch Chassis\r\n JF430B\r\n\r\nHP\r\n A12518 Switch Chassis\r\n\r\nH3C\r\n S12518 (AC-1) Routing Switch\r\n 0235A0GF\r\n\r\nHP\r\n 12518 Switch Chassis\r\n JF430C\r\n\r\nHP\r\n 1910-16G Switch\r\n JE005A\r\n\r\n3Com\r\n Baseline Plus 2900G Switch - 20 port\r\n 3CRBSG2093\r\n\r\nHP\r\n 1910-24G Switch\r\n JE006A\r\n\r\n3Com\r\n Baseline Plus 2900G Switch - 28 port\r\n 3CRBSG2893\r\n\r\nHP\r\n 1910-24G-PoE (365W) Switch\r\n JE007A\r\n\r\n3Com\r\n Baseline Plus 2900G Switch - 28HPWR\r\n 3CRBSG28HPWR93\r\n\r\nHP\r\n 1910-24G-PoE (170W) Switch\r\n JE008A\r\n\r\nHP\r\n V1910-24G-PoE (170W) Switch\r\n\r\n3Com\r\n Baseline Plus 2900G Switch - 28PWR\r\n 3CRBSG28PWR93\r\n\r\nHP\r\n 1910-48G Switch\r\n JE009A\r\n\r\n3Com\r\n Baseline Plus 2900 Switch Gigabit Family - 52 port\r\n 3CRBSG5293\r\n\r\nHP\r\n 1910-8G Switch\r\n JG348A\r\n\r\nHP\r\n 1910-8G-PoE+ (180W) Switch\r\n JG350A\r\n\r\nHP\r\n 1910-8G-PoE+ (65W) Switch\r\n JG349A\r\n\r\nHP\r\n 200-CS UTM Appliance\r\n JD268A\r\n\r\nH3C\r\n SecPath U200-CS\r\n 0235A0CT\r\n\r\nHP\r\n 200-M UTM Appliance\r\n JD274A\r\n\r\nHP\r\n 3000-10G-PoE+ Wireless Switch\r\n JD450A\r\n\r\nHP\r\n A3000-10G-PoE+ Wireless Switch\r\n\r\nH3C\r\n WX3010,8 PoEPlus\r\n 0235A37U\r\n\r\nHP\r\n 3000-24G-PoE+ Wireless Switch\r\n JD449A\r\n\r\nHP\r\n A3000-24G-PoE+ Wireless Switch\r\n\r\nH3C\r\n WX3024,4SFPCombo Plus Slot Plus PoEPlus\r\n 0235A37T\r\n\r\nHP\r\n 3000-8G-PoE+ Wireless Switch\r\n JD444A\r\n\r\nH3C\r\n WX3008, 4 POE Plus\r\n 0235A0AS\r\n\r\nHP\r\n 3012 Router\r\n JD916A\r\n\r\n3Com\r\n 3012 Router\r\n 3C13612\r\n\r\nHP\r\n 3013 Router\r\n JD917A\r\n\r\n3Com\r\n 3013 Router\r\n 3C13613\r\n\r\nHP\r\n 3016 Router\r\n JD918A\r\n\r\n3Com\r\n 3016 Router\r\n 3C13616\r\n\r\nHP\r\n 3036 Router\r\n JD921A\r\n\r\n3Com\r\n 3036 Router\r\n 3C13636\r\n\r\nHP\r\n 3040 Router\r\n JD922A\r\n\r\n3Com\r\n 3040 Router\r\n 3C13640\r\n\r\nHP\r\n 3041 Router\r\n JD923A\r\n\r\n3Com\r\n 3041 Router\r\n 3C13641\r\n\r\nHP\r\n 3100-16 DC EI Switch\r\n JD314A\r\n\r\nHP\r\n A3100-16 DC EI Switch\r\n\r\nH3C\r\n S3100-16TP-EI - model LS-3100-16TP-EI-H3-D-O\r\n 0235A23H\r\n\r\nHP\r\n 3100-16 EI Switch\r\n JD319A\r\n\r\nH3C\r\n S3100-16TP-EI - model LS-3100-16TP-EI-H3-A-O\r\n 0235A300\r\n\r\nHP\r\n 3100-16 SI Switch\r\n JD305A\r\n\r\nH3C\r\n S3100-16T-SI - model LS-S3100-16T-SI-AC-OVS\r\n 0235A15C\r\n\r\nHP\r\n 3100-16 v2 EI Switch\r\n JD319B\r\n\r\nHP\r\n 3100-16 v2 SI Switch\r\n JG222A\r\n\r\nHP\r\n 3100-16-PoE EI Switch\r\n JD312A\r\n\r\nH3C\r\n S3100-16TP-PWR-EI - model LS-3100-16TP-PWR-EI-H3\r\n 0235A19C\r\n\r\nHP\r\n 3100-24 DC EI Switch\r\n JD315A\r\n\r\nHP\r\n A3100-24 DC EI Switch\r\n\r\nH3C\r\n S3100-26TP-EI - model LS-3100-26TP-EI-H3-D-O\r\n 0235A23P\r\n\r\nHP\r\n 3100-24 EI Switch\r\n JD320A\r\n\r\nHP\r\n A3100-24 EI Switch\r\n\r\nH3C\r\n S3100-26TP-EI - model LS-3100-26TP-EI-H3-A-O\r\n 0235A301\r\n\r\nHP\r\n 3100-24 SI Switch\r\n JD306A\r\n\r\nHP\r\n A3100-24 SI Switch\r\n\r\nH3C\r\n S3100-26T-SI - model LS-S3100-26T-SI-AC-OVS\r\n 0235A15D\r\n\r\nHP\r\n 3100-24 v2 EI Switch\r\n JD320B\r\n\r\nHP\r\n 3100-24 v2 SI Switch\r\n JG223A\r\n\r\nHP\r\n 3100-24-PoE EI Switch\r\n JD313A\r\n\r\nHP\r\n A3100-24-PoE EI Switch\r\n\r\nH3C\r\n S3100-26TP-PWR-EI - model LS-3100-26TP-PWR-EI-H3\r\n 0235A19D\r\n\r\nHP\r\n 3100-24-PoE v2 EI Switch\r\n JD313B\r\n\r\nHP\r\n 3100-48 Switch\r\n JD317A\r\n\r\nH3C\r\n S3100-52P - model LS-3100-52P-OVS-H3\r\n 0235A248\r\n\r\nHP\r\n 3100-48 v2 Switch\r\n JG315A\r\n\r\nHP\r\n 3100-8 DC EI Switch\r\n JD316A\r\n\r\nH3C\r\n S3100-8TP-EI - model LS-3100-8TP-EI-H3-D-O\r\n 0235A23T\r\n\r\nHP\r\n 3100-8 EI Switch\r\n JD318A\r\n\r\nH3C\r\n S3100-8TP-EI - model LS-3100-8TP-EI-H3-A-O\r\n 0235A29Y\r\n\r\nHP\r\n 3100-8 SI Switch\r\n JD304A\r\n\r\nHP\r\n A3100-8 SI Switch\r\n\r\nH3C\r\n S3100-8T-SI - model LS-S3100-8T-SI-AC-OVS\r\n 0235A15B\r\n\r\nHP\r\n 3100-8 SI Switch\r\n JD307A\r\n\r\nH3C\r\n S3100-8C-SI - model LS-S3100-8C-SI-AC-OVS\r\n 0235A15F\r\n\r\nHP\r\n 3100-8 v2 EI Switch\r\n JD318B\r\n\r\nHP\r\n 3100-8 v2 SI Switch\r\n JG221A\r\n\r\nHP\r\n 3100-8-PoE EI Switch\r\n JD311A\r\n\r\nH3C\r\n S3100-8TP-PWR-EI - model LS-3100-8TP-PWR-EI-H3\r\n 0235A19B\r\n\r\nHP\r\n 3600-24 EI Switch\r\n JD331A\r\n\r\nHP\r\n A3600-24 EI Switch\r\n\r\nH3C\r\n S3600-28P-EI - model LS-3600-28P-EI-OVS\r\n 0235A10H\r\n\r\nHP\r\n 3600-24 SI Switch\r\n JD330A\r\n\r\nHP\r\n A3600-24 SI Switch\r\n\r\nH3C\r\n S3600-28P-SI - model LS-3600-28P-SI-OVS\r\n 0235A10G\r\n\r\nHP\r\n 3600-24 v2 EI Switch\r\n JG299A\r\n\r\nHP\r\n 3600-24 v2 SI Switch\r\n JG304A\r\n\r\nHP\r\n 3600-24-PoE EI Switch\r\n JD326A\r\n\r\nHP\r\n A3600-24-PoE EI Switch\r\n\r\nH3C\r\n S3600-28P-PWR-EI - model LS-3600-28P-PWR-EI-OVS\r\n 0235A10C\r\n\r\nHP\r\n 3600-24-PoE SI Switch\r\n JD325A\r\n\r\nHP\r\n A3600-24-PoE SI Switch\r\n\r\nH3C\r\n S3600-28P-PWR-SI - model LS-3600-28P-PWR-SI-OVS\r\n 0235A10B\r\n\r\nHP\r\n 3600-24-PoE+ v2 EI Switch\r\n JG301A\r\n\r\nHP\r\n 3600-24-SFP EI Switch\r\n JD334A\r\n\r\nHP\r\n A3600-24-SFP EI Switch\r\n\r\nH3C\r\n S3600-28F-EI - model LS-3600-28F-EI-OVS\r\n 0235A10L\r\n\r\nHP\r\n 3600-24-SFP v2 EI Switch\r\n JG303A\r\n\r\nHP\r\n 3600-24TP SI Switch\r\n JD329A\r\n\r\nHP\r\n A3600-24TP SI Switch\r\n\r\nH3C\r\n S3600-28TP-SI - model LS-3600-28TP-SI-OVS\r\n 0235A10F\r\n\r\nHP\r\n 3600-48 EI Switch\r\n JD333A\r\n\r\nHP\r\n A3600-48 EI Switch\r\n\r\nH3C\r\n S3600-52P-EI - model LS-3600-52P-EI-OVS\r\n 0235A10K\r\n\r\nHP\r\n 3600-48 SI Switch\r\n JD332A\r\n\r\nH3C\r\n S3600-52P-SI - model LS-3600-52P-SI-OVS\r\n 0235A10J\r\n\r\nHP\r\n 3600-48 v2 EI Switch\r\n JG300A\r\n\r\nHP\r\n 3600-48 v2 SI Switch\r\n JG305A\r\n\r\nHP\r\n 3600-48-PoE EI Switch\r\n JD328A\r\n\r\nHP\r\n A3600-48-PoE EI Switch\r\n\r\nH3C\r\n S3600-52P-PWR-EI - model LS-3600-52P-PWR-EI-OVS\r\n 0235A10E\r\n\r\nHP\r\n 3600-48-PoE SI Switch\r\n JD327A\r\n\r\nHP\r\n A3600-48-PoE SI Switch\r\n\r\nH3C\r\n S3600-52P-PWR-SI - model LS-3600-52P-PWR-SI-OVS\r\n 0235A10D\r\n\r\nHP\r\n 3600-48-PoE+ v2 EI Switch\r\n JG302A\r\n\r\nHP\r\n 3600-48-PoE+ v2 SI Switch\r\n JG307A\r\n\r\nHP\r\n 3610-24-2G-2G-SFP Switch\r\n JD337A\r\n\r\nHP\r\n A3610-24-2G-SFP Switch\r\n\r\nH3C\r\n S3610-28TP - model LS-3610-28TP-OVS\r\n 0235A22E\r\n\r\nHP\r\n 3610-24-4G-SFP Switch\r\n JD336A\r\n\r\nHP\r\n A3610-24-4G Switch\r\n\r\nH3C\r\n S3610-28P - model LS-3610-28P-OVS\r\n 0235A22D\r\n\r\nHP\r\n 3610-24-SFP Switch\r\n JD338A\r\n\r\nHP\r\n A3610-24-SFP Switch\r\n\r\nH3C\r\n S3610-28F - model LS-3610-28F-OVS\r\n 0235A22F\r\n\r\nHP\r\n 3610-48 Switch\r\n JD335A\r\n\r\nHP\r\n A3610-48 Switch\r\n\r\nH3C\r\n S3610-52P - model LS-3610-52P-OVS\r\n 0235A22C\r\n\r\nHP\r\n 4200-12G Switch\r\n JE015A\r\n\r\nHP\r\n E4200-12G Switch\r\n\r\n3Com\r\n 4200G Switch 12-Port\r\n 3CR17660-91\r\n\r\nHP\r\n 4210-16 Switch\r\n JE024A\r\n\r\nHP\r\n E4210-16 Switch\r\n\r\n3Com\r\n 4210 Switch 18-Port\r\n 3CR17332-91\r\n\r\nHP\r\n 4210-16 Switch\r\n JE025A\r\n\r\n3Com\r\n SWITCH 4210 18-Port\r\n 3CR17332A-91\r\n\r\nHP\r\n 4210-24 Switch\r\n JE026A\r\n\r\n3Com\r\n 4210 Switch 26-Port\r\n 3CR17333-91\r\n\r\nHP\r\n 4210-24 Switch\r\n JF427A\r\n\r\nHP\r\n E4210-24 Switch\r\n\r\n3Com\r\n 4210 Switch 26-Port\r\n 3CR17333A-91\r\n\r\nHP\r\n 4210-24G Switch\r\n JF844A\r\n\r\nHP\r\n E4210-24G Switch\r\n\r\n3Com\r\n 4210-24G Switch\r\n 3CRS42G-24-91\r\n\r\nHP\r\n 4210-24G-PoE Switch\r\n JF846A\r\n\r\nHP\r\n E4210-24G-PoE Switch\r\n\r\n3Com\r\n Switch E4210-24G-PoE\r\n 3CRS42G-24P-91\r\n\r\nHP\r\n 4210-24-PoE Switch\r\n JE032A\r\n\r\n3Com\r\n 4210 Switch PWR 26-Port\r\n 3CR17343-91\r\n\r\nHP\r\n 4210-24-PoE Switch\r\n JE033A\r\n\r\n3Com\r\n 4210 PWR Switch 26-Port\r\n 3CR17343A-91\r\n\r\nHP\r\n 4210-48 Switch\r\n JE027A\r\n\r\n3Com\r\n 4210 Switch 52-Port\r\n 3CR17334-91\r\n\r\nHP\r\n 4210-48G Switch\r\n JF845A\r\n\r\nHP\r\n E4210-48G Switch\r\n\r\n3Com\r\n 4210-48G Switch\r\n 3CRS42G-48-91\r\n\r\nHP\r\n 4210-8 Switch\r\n JE021A\r\n\r\n3Com\r\n 4210 Switch 9-Port\r\n 3CR17331-91\r\n\r\nHP\r\n 4210-8 Switch\r\n JE022A\r\n\r\n3Com\r\n 4210 Switch 9-Port\r\n 3CR17331A-91\r\n\r\nHP\r\n 4210-8-PoE Switch\r\n JE028A\r\n\r\n3Com\r\n 4210 PWR Switch 9-Port\r\n 3CR17341-91\r\n\r\nHP\r\n 4210-8-PoE Switch\r\n JE029A\r\n\r\n3Com\r\n 4210 PWR Switch 9-Port\r\n 3CR17341A-91\r\n\r\nHP\r\n 4500-24 Switch\r\n JE045A\r\n\r\n3Com\r\n 4500 Switch 26-Port\r\n 3CR17561-91\r\n\r\nHP\r\n 4500-24G-PoE Switch\r\n JE061A\r\n\r\n3Com\r\n 4500G PWR Switch 24-Port\r\n 3CR17771-91\r\n\r\nHP\r\n 4500-24-PoE Switch\r\n JE047A\r\n\r\n3Com\r\n 4500 PWR Switch 26-Port\r\n 3CR17571-91\r\n\r\nHP\r\n 4500-48 Switch\r\n JE046A\r\n\r\n3Com\r\n 4500 Switch 50-Port\r\n 3CR17562-91\r\n\r\nHP\r\n 4500-48G-PoE Switch\r\n JE063A\r\n\r\nHP\r\n E4500-48G-PoE Switch\r\n\r\n3Com\r\n 4500G PWR Switch 48-Port\r\n 3CR17772-91\r\n\r\nHP\r\n 4500-48-PoE Switch\r\n JE048A\r\n\r\n3Com\r\n 4500 PWR Switch 50-Port\r\n 3CR17572-91\r\n\r\nHP\r\n 4510-24G Switch\r\n JF847A\r\n\r\nHP\r\n E4510-24G Switch\r\n\r\n3Com\r\n Switch E4510-24G\r\n 3CRS45G-24-91\r\n\r\nHP\r\n 4510-48G Switch\r\n JF428A\r\n\r\nHP\r\n E4510-48G Switch\r\n\r\n3Com\r\n 4510G Switch 48 Port\r\n 3CRS45G-48-91\r\n\r\nHP\r\n 4800-24G Switch\r\n JD007A\r\n\r\n3Com\r\n 4800G Switch 24-Port\r\n 3CRS48G-24-91\r\n\r\nHP\r\n 4800-24G-PoE Switch\r\n JD008A\r\n\r\n3Com\r\n 4800G PWR Switch 24-Port\r\n 3CRS48G-24P-91\r\n\r\nHP\r\n 4800-24G-SFP Switch\r\n JD009A\r\n\r\nHP\r\n E4800-24G-SFP Switch\r\n\r\n3Com\r\n 4800G Switch 24-Port SFP\r\n 3CRS48G-24S-91\r\n\r\nHP\r\n 4800-48G Switch\r\n JD010A\r\n\r\n3Com\r\n 4800G Switch 48-Port\r\n 3CRS48G-48-91\r\n\r\nHP\r\n 4800-48G-PoE Switch\r\n JD011A\r\n\r\n3Com\r\n 4800G PWR Switch 48-Port\r\n 3CRS48G-48P-91\r\n\r\nHP\r\n 5012 Router\r\n JD935A\r\n\r\n3Com\r\n 5012 Router\r\n 3C13701\r\n\r\nHP\r\n 5120-16G SI Switch\r\n JE073A\r\n\r\nH3C\r\n S5120-20P-SI L2, 16GE Plus 4SFP\r\n 0235A42B\r\n\r\nHP\r\n 5120-24G EI TAA-compliant Switch with 2 Interface Slots\r\n JG245A\r\n\r\nHP\r\n 5120-24G SI Switch\r\n JE074A\r\n\r\nH3C\r\n S5120-28P-SI 24GE Plus 4 SFP\r\n 0235A42D\r\n\r\nHP\r\n 5120-24G-PoE+ (170W) SI Switch\r\n JG092A\r\n\r\nH3C\r\n S5120-28P-PWR-SI\r\n 0235A0E3\r\n\r\nHP\r\n 5120-24G-PoE+ (370W) SI Switch\r\n JG091A\r\n\r\nH3C\r\n S5120-28P-HPWR-SI\r\n 0235A0E5\r\n\r\nHP\r\n 5120-24G-PoE+ EI Switch with 2 Interface Slots\r\n JG236A\r\n\r\nHP\r\n 5120-24G-PoE+ EI TAA-compliant Switch with 2 Slots\r\n JG247A\r\n\r\nHP\r\n 5120-48G EI TAA-compliant Switch with 2 Interface Slots\r\n JG246A\r\n\r\nHP\r\n 5120-48G SI Switch\r\n JE072A\r\n\r\nHP\r\n A5120-48G SI Switch\r\n\r\nH3C\r\n S5120-52P-SI 48GE Plus 4 SFP\r\n 0235A41W\r\n\r\nHP\r\n 5120-48G-PoE+ EI Switch with 2 Interface Slots\r\n JG237A\r\n\r\nHP\r\n 5120-48G-PoE+ EI TAA-compliant Switch with 2 Slots\r\n JG248A\r\n\r\nHP\r\n 5232 Router\r\n JD943A\r\n\r\n3Com\r\n 5232 Router\r\n 3C13751\r\n\r\nHP\r\n 5500-24G DC EI Switch\r\n JD373A\r\n\r\nH3C\r\n S5500-28C-EI-DC,Ethernet Switch\r\n 0235A24S\r\n\r\nHP\r\n 5500-24G EI Switch\r\n JD377A\r\n\r\nH3C\r\n S5500-28C-EI,Ethernet Switch\r\n 0235A253\r\n\r\nHP\r\n 5500-24G EI TAA-compliant Switch with 2 Interface Slots\r\n JG250A\r\n\r\nHP\r\n 5500-24G SI Switch\r\n JD369A\r\n\r\nH3C\r\n S5500-28C-SI,Ethernet Switch\r\n 0235A04U\r\n\r\nHP\r\n 5500-24G-4SFP HI Switch with 2 Interface Slots\r\n JG311A\r\n\r\nHP\r\n 5500-24G-PoE EI Switch\r\n JD378A\r\n\r\nH3C\r\n S5500-28C-PWR-EI,Ethernet Switch\r\n 0235A255\r\n\r\nHP\r\n 5500-24G-PoE SI Switch\r\n JD371A\r\n\r\nH3C\r\n S5500-28C-PWR-SI,Ethernet Switch\r\n 0235A05H\r\n\r\nHP\r\n 5500-24G-PoE+ EI Switch with 2 Interface Slots\r\n JG241A\r\n\r\nHP\r\n 5500-24G-PoE+ EI TAA-compliant Switch with 2 Interface Slots\r\n JG252A\r\n\r\nHP\r\n 5500-24G-PoE+ SI Switch with 2 Interface Slots\r\n JG238A\r\n\r\nHP\r\n 5500-24G-SFP DC EI Switch\r\n JD379A\r\n\r\nH3C\r\n S5500-28F-EI,Eth Swtch,DC Single Pwr\r\n 0235A259\r\n\r\nHP\r\n 5500-24G-SFP EI Switch\r\n JD374A\r\n\r\nH3C\r\n S5500-28F-EI,Eth Switch,AC Single\r\n 0235A24U\r\n\r\nHP\r\n 5500-24G-SFP EI TAA-compliant Switch with 2 Interface Slots\r\n JG249A\r\n\r\nHP\r\n 5500-48G EI Switch\r\n JD375A\r\n\r\nH3C\r\n S5500-52C-EI,Ethernet Switch\r\n 0235A24X\r\n\r\nHP\r\n 5500-48G EI TAA-compliant Switch with 2 Interface Slots\r\n JG251A\r\n\r\nHP\r\n 5500-48G SI Switch\r\n JD370A\r\n\r\nH3C\r\n S5500-52C-SI,Ethernet Switch\r\n 0235A04V\r\n\r\nHP\r\n 5500-48G-4SFP HI Switch with 2 Interface Slots\r\n JG312A\r\n\r\nHP\r\n 5500-48G-PoE EI Switch\r\n JD376A\r\n\r\nH3C\r\n S5500-52C-PWR-EI,Ethernet Switch\r\n 0235A251\r\n\r\nHP\r\n 5500-48G-PoE SI Switch\r\n JD372A\r\n\r\nH3C\r\n S5500-52C-PWR-SI,Ethernet Switch\r\n 0235A05J\r\n\r\nHP\r\n 5500-48G-PoE+ EI Switch with 2 Interface Slots\r\n JG240A\r\n\r\nHP\r\n 5500-48G-PoE+ EI TAA-compliant Switch with 2 Interface Slots\r\n JG253A\r\n\r\nHP\r\n 5500-48G-PoE+ SI Switch with 2 Interface Slots\r\n JG239A\r\n\r\nHP\r\n 5500G-24 EI 10/100/1000 No Power Supply Unit Switch\r\n JF551A\r\n\r\n3Com\r\n SS4 5500G-EI Switch 24PT (NO PSU)\r\n 3CR17254-91\r\n\r\nHP\r\n 5500G-24 EI SFP No Power Supply Unit Switch\r\n JF553A\r\n\r\n3Com\r\n SS4 5500G-EI 24 Port,SFP (NO PSU)\r\n 3CR17259-91\r\n\r\nHP\r\n 5500G-48 EI 10/100/1000 No Power Supply Unit Switch\r\n JF552A\r\n\r\n3Com\r\n SS4 5500G-EI Switch 48PT (NO PSU)\r\n 3CR17255-91\r\n\r\nHP\r\n 5682 Router\r\n JD946A\r\n\r\n3Com\r\n 5682 Router\r\n 3C13759\r\n\r\nHP\r\n 5800-24G Switch\r\n JC100A\r\n\r\nH3C\r\n S5800-32C - 24-port 1BT Plus 4-port (SFP Plus ) Plus 1 media slot\r\n 0235A36U\r\n\r\nHP\r\n 5800-24G TAA-compliant Switch\r\n JG255A\r\n\r\nHP\r\n 5800-24G-PoE Switch\r\n JC099A\r\n\r\nH3C\r\n S5800-32C-PWR - 24-port 10/100/1000BASE-T (RJ45) Plus 4-port 10GBASE-X (SFP\r\nPlus ) Plus 1 media module, PoE\r\n 0235A36S\r\n\r\nHP\r\n 5800-24G-PoE+ TAA-compliant Switch\r\n JG254A\r\n\r\nHP\r\n 5800-24G-SFP Switch\r\n JC103A\r\n\r\nH3C\r\n S5800-32F 24-port 1000BASE-X (SFP) Plus 4-port 10GBASE-X (SFP Plus ) Plus\r\nmedia module (no power)\r\n 0235A374\r\n\r\nHP\r\n 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot\r\n JG256A\r\n\r\nHP\r\n 5800-48G Switch\r\n JC105A\r\n\r\nH3C\r\n S5800-56C 48-port 10/100/1000BASE-T (RJ45) Plus 4port 10GBASE-X (SFP Plus )\r\nPlus media module\r\n 0235A379\r\n\r\nHP\r\n 5800-48G Switch with 2 Slots\r\n JC101A\r\n\r\nH3C\r\n S5800-60C-PWR 48-port BT Plus 4-port SFP Plus 2 media modules Plus OSM\r\n 0235A36W\r\n\r\nHP\r\n 5800-48G TAA-compliant Switch with 1 Interface Slot\r\n JG258A\r\n\r\nHP\r\n 5800-48G-PoE Switch\r\n JC104A\r\n\r\nH3C\r\n S5800-56C-PWR 48-port BT Plus 4 port (SFP Plus ) Plus media module\r\n 0235A378\r\n\r\nHP\r\n 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot\r\n JG257A\r\n\r\nHP\r\n 5800-48G-PoE+ TAA-compliant Switch with 2 Interface Slots\r\n JG242A\r\n\r\nHP\r\n 5800AF-48G Switch\r\n JG225A\r\n\r\nHP\r\n 5810-48G Switch\r\n JF242A\r\n\r\nHP\r\n A5810-48G with 2 SFP+ slots AC Switch\r\n\r\nH3C\r\n S5810 48-BT, 2 SFP Plus , AC\r\n 0235A42H\r\n\r\nHP\r\n 5820 VPN Firewall Module\r\n JD255A\r\n\r\nHP\r\n A5820 VPN Firewall Module\r\n\r\nH3C\r\n S5820 SecBlade VPN Firewall Module\r\n LSWM1FW10, 0231A94J\r\n\r\nHP\r\n 5830 CTO Built Switch\r\n JG478A\r\n\r\nHP\r\n 5830AF-48G Switch with 1 Interface Slot\r\n JC691A\r\n\r\nHP\r\n 5830AF-96G Switch\r\n JC694A\r\n\r\nHP\r\n 6600 Firewall Processing Router Module\r\n JD250A\r\n\r\nHP\r\n A6600 Firewall Processing Module\r\n\r\nH3C\r\n SR66 Gigabit Firewall Module\r\n 0231A88A\r\n\r\nHP\r\n 6600 RPE-X1 Router Module\r\n JC165A\r\n\r\nHP\r\n A6600 RPE-X1 Main Processing Unit\r\n\r\nH3C\r\n RT-SR66-RPE-X1-H3\r\n RPE-X1, 0231A761\r\n\r\nHP\r\n 6600 RSE-X1 Router Main Processing Unit\r\n JC566A\r\n\r\nHP\r\n 6602 Router Chassis\r\n JC176A\r\n\r\nHP\r\n A6602 Router\r\n\r\nH3C\r\n SR6602 1U Router Host\r\n 0235A27D\r\n\r\nHP\r\n 6604 Router Chassis\r\n JC178A\r\n\r\nHP\r\n A6604 Router Chassis\r\n\r\nH3C\r\n RT-SR6604-OVS-H3\r\n 0235A37X\r\n\r\nHP\r\n 6604 Router Chassis\r\n JC178B\r\n\r\nHP\r\n 6608 Router\r\n JC177A\r\n\r\nHP\r\n A6608 Router\r\n\r\nH3C\r\n RT-SR6608-OVS-H3\r\n 0235A32X\r\n\r\nHP\r\n 6608 Router Chassis\r\n JC177B\r\n\r\nHP\r\n 6616 Router Chassis\r\n JC496A\r\n\r\nHP\r\n A6616 Router Chassis\r\n\r\nH3C\r\n SR6616 Router Chassis\r\n 0235A41D\r\n\r\nHP\r\n 7500 384Gbps Fabric Module\r\n JD194A\r\n\r\nHP\r\n A7500 384Gbps Fabric/Main Processing Unit\r\n\r\nH3C\r\n S7500E 384 Gbps Fabric\r\n 0231A73K\r\n\r\nHP\r\n 7500 384Gbps Fabric Module with 2 XFP Ports\r\n JD193A\r\n\r\nHP\r\n A7500 384Gbps Fabric/Main Processing Unit with 2 10GbE XFP Ports\r\n\r\nH3C\r\n S7500E 384 Gbps Fabric w/ 2-port 10GBASE-X (XFP)\r\n 0231A73J\r\n\r\nHP\r\n 7500 384Gbps Fabric Module with 2 XFP Ports\r\n JD193B\r\n\r\nHP\r\n A7500 384Gbps Fabric/Main Processing Unit with 2 10GbE XFP Ports\r\n\r\nH3C\r\n S7500E Salience VI-10G Switch and Route Processing Unit,with 2 XFP\r\nInterfaces\r\n LSQ1SRP2XB0, 0231A0KW\r\n\r\nHP\r\n 7500 384Gbps TAA-compliant Fabric / Main Processing Unit\r\n JC700A\r\n\r\nHP\r\n 7500 384Gbps TAA-compliant Fabric / MPU with 2 10GbE XFP Ports\r\n JC699A\r\n\r\nHP\r\n 7500 768Gbps Fabric Module\r\n JD220A\r\n\r\nHP\r\n A7510 768Gbps Fabric/Main Processing Unit\r\n\r\nH3C\r\n S7510E 768 Gbps Fabric\r\n LSQ1SRPD0, 0231A86P\r\n\r\nHP\r\n 7500 768Gbps TAA-compliant Fabric / Main Processing Unit\r\n JC701A\r\n\r\nHP\r\n A7510 768Gbps TAA-compliant Fabric/Main Processing Unit\r\n\r\nHP\r\n 7502 Switch Chassis\r\n JD242A\r\n\r\nHP\r\n A7502 Switch Chassis\r\n\r\nH3C\r\n S7502E Chassis w/ fans\r\n 0235A29A\r\n\r\nHP\r\n 7502 Switch Chassis\r\n JD242B\r\n\r\nH3C\r\n S7502E Ethernet Switch Chassis with Fan\r\n 0235A0G4\r\n\r\nHP\r\n 7502 TAA-compliant Main Processing Unit\r\n JC697A\r\n\r\nHP\r\n A7502 TAA-compliant Main Processing Unit\r\n\r\nHP\r\n 7503 Switch Chassis\r\n JD240A\r\n\r\nHP\r\n A7503 Switch Chassis\r\n\r\nH3C\r\n S7503E Chassis w/ fans\r\n 0235A27R\r\n\r\nHP\r\n 7503 Switch Chassis\r\n JD240B\r\n\r\nHP\r\n A7503 Switch Chassis\r\n\r\nH3C\r\n S7503E Ethernet Switch Chassis with Fan\r\n 0235A0G2\r\n\r\nHP\r\n 7503 Switch Chassis with 1 Fabric Slot\r\n JD243A\r\n\r\nHP\r\n A7503-S Switch Chassis\r\n\r\nH3C\r\n S7503E-S Chassis w/ fans\r\n 0235A33R\r\n\r\nHP\r\n 7503 Switch Chassis with 1 Fabric Slot\r\n JD243B\r\n\r\nH3C\r\n S7503E-S Ethernet Switch Chassis with Fan\r\n 0235A0G5\r\n\r\nHP\r\n 7503-S 144Gbps Fabric/MPU with PoE Upgradable 20-port Gig-T/4-port GbE Combo\r\n JC666A\r\n\r\nHP\r\n 7503-S 144Gbps TAA Fabric / MPU with 16 GbE SFP Ports and 8 GbE Combo Ports\r\n JC698A\r\n\r\nHP\r\n 7506 Switch Chassis\r\n JD239A\r\n\r\nHP\r\n A7506 Switch Chassis H3C S7506E Chassis w/ fans\r\n 0235A27Q\r\n\r\nHP\r\n 7506 Switch Chassis\r\n JD239B\r\n\r\nHP\r\n A7506 Switch Chassis\r\n\r\nH3C\r\n S7506E Ethernet Switch Chassis with Fan\r\n 0235A0G1\r\n\r\nHP\r\n 7506 Vertical Switch Chassis\r\n JD241A\r\n\r\nHP\r\n A7506-V Switch Chassis\r\n\r\nH3C\r\n S7506E-V Chassis w/ fans\r\n 0235A27S\r\n\r\nHP\r\n 7506 Vertical Switch Chassis\r\n JD241B\r\n\r\nHP\r\n A7506-V Switch Chassis\r\n\r\nH3C\r\n S7506E-V Ethernet Switch Chassis with Fan\r\n 0235A0G3\r\n\r\nHP\r\n 7510 Switch Chassis\r\n JD238A\r\n\r\nHP\r\n A7510 Switch Chassis\r\n\r\nH3C\r\n S7510E Chassis w/ fans\r\n 0235A25N\r\n\r\nHP\r\n 7510 Switch Chassis\r\n JD238B\r\n\r\nHP\r\n A7510 Switch Chassis\r\n\r\nH3C\r\n S7510E Ethernet Switch Chassis with Fan\r\n 0235A0G0\r\n\r\nHP\r\n 8800 Firewall Processing Module\r\n JD251A\r\n\r\nH3C\r\n SR88 Firewall Processing Module\r\n 0231A88L\r\n\r\nHP\r\n 8802 Router Chassis\r\n JC147A\r\n\r\nHP\r\n A8802 Router Chassis\r\n\r\nH3C\r\n SR8802 10G Core Router Chassis\r\n 0235A31B\r\n\r\nHP\r\n 8802 Router Chassis\r\n JC147B\r\n\r\nHP\r\n A8802 Router Chassis\r\n\r\nH3C\r\n SR8802 10G Core Router Chassis\r\n 0235A0GC\r\n\r\nHP\r\n 8805 Router Chassis\r\n JC148A\r\n\r\nHP\r\n A8805 Router Chassis\r\n\r\nH3C\r\n SR8805 10G Core Router Chassis\r\n 0235A31C\r\n\r\nHP\r\n 8805 Router Chassis\r\n JC148B\r\n\r\nHP\r\n A8805 Router Chassis\r\n\r\nH3C\r\n SR8805 10G Core Router Chassis\r\n 0235A0G8\r\n\r\nHP\r\n 8807 7-slot Chassis Kit\r\n JE203A\r\n\r\n3Com\r\n 8807 Switch 7-slot Chassis Kit\r\n 3C17543\r\n\r\nHP\r\n 8807 Kit (TAA) Switch\r\n JE204A\r\n\r\n3Com\r\n SW8807 Kit TAA\r\n 3C17543TAA\r\n\r\nHP\r\n 8808 Router Chassis\r\n JC149A\r\n\r\nHP\r\n A8808 Router Chassis\r\n\r\nH3C\r\n SR8808 10G Core Router Chassis\r\n 0235A31D\r\n\r\nHP\r\n 8808 Router Chassis\r\n JC149B\r\n\r\nHP\r\n A8808 Router Chassis\r\n\r\nH3C\r\n SR8808 10G Core Router Chassis\r\n 0235A0G9\r\n\r\nHP\r\n 8810 10-slot AC (TAA) Chassis Kit\r\n JE201A\r\n\r\n3Com\r\n SW8810 AC Chassis Kit TAA\r\n 3C17541TAA\r\n\r\nHP\r\n 8810 10-slot Chassis Kit\r\n JE200A\r\n\r\n3Com\r\n 8810 Switch 10-slot Chassis Kit\r\n 3C17541\r\n\r\nHP\r\n 8812 Router Chassis\r\n JC150A\r\n\r\nHP\r\n A8812 Router Chassis\r\n\r\nH3C\r\n SR8812 10G Core Router Chassis\r\n 0235A31E\r\n\r\nHP\r\n 8812 Router Chassis\r\n JC150B\r\n\r\nHP\r\n A8812 Router Chassis\r\n\r\nH3C\r\n SR8812 10G Core Router Chassis\r\n 0235A0GA\r\n\r\nHP\r\n 8814 14-slot AC (TAA) Chassis Kit\r\n JE199A\r\n\r\n3Com\r\n SW8814 AC Chassis Kit TAA\r\n 3C17540TAA\r\n\r\nHP\r\n 8814 14-slot Chassis Kit\r\n JE198A\r\n\r\n3Com\r\n 8814 Switch 14-slot Chassis Kit\r\n 3C17540\r\n\r\nHP\r\n 9500 VPN Firewall Module\r\n JD245A\r\n\r\nH3C\r\n S9500E SecBlade VPN Firewall Module\r\n LSR1FW2A1, 0231A0AV\r\n\r\nHP\r\n 9505 Switch Chassis\r\n JC124B\r\n\r\nHP\r\n A9505 Switch Chassis\r\n\r\nH3C\r\n S9505E Routing-Switch Chassis\r\n 0235A0G6\r\n\r\nHP\r\n 9508-V Switch Chassis\r\n JC474A\r\n\r\nH3C\r\n S9508E-V Routing-Switch Chassis\r\n 0235A38Q\r\n\r\nHP\r\n 9508-V Switch Chassis\r\n JC474B\r\n\r\nH3C\r\n S9508E-V Routing-Switch Chassis\r\n 0235A38Q\r\n\r\nHP\r\n 9512 Switch Chassis\r\n JC125A\r\n\r\nHP\r\n A9512 Switch Chassis\r\n\r\nH3C\r\n S9512E Chassis w/ Fans\r\n 0235A38R\r\n\r\nHP\r\n 9512 Switch Chassis\r\n JC125B\r\n\r\nHP\r\n A9512 Switch Chassis\r\n\r\nH3C\r\n S9512E Routing-Switch Chassis\r\n 0235A0G7\r\n\r\nHP\r\n A3100 (LS6MCFL1UB) Ethernet Switch\r\n JE545A\r\n\r\nH3C\r\n S3100 Ethernet Switch,LS6MCFL1UB,Sin\r\n 0231A65T\r\n\r\nHP\r\n A3100-16 DC SI 2-slot Switch\r\n JD302A\r\n\r\nH3C\r\n S3100-16C-SI - model LS-S3100-16C-SI-DC-OVS\r\n 0235A14V\r\n\r\nHP\r\n A3100-16 SI with 2 External Slots Switch\r\n JD308A\r\n\r\nH3C\r\n S3100-16C-SI - model LS-S3100-16C-SI-AC-OVS\r\n 0235A15G\r\n\r\nHP\r\n A3100-24 DC SI 2-slot Switch\r\n JD303A\r\n\r\nH3C\r\n S3100-26C-SI - model LS-S3100-26C-SI-DC-OVS\r\n 0235A14W\r\n\r\nHP\r\n A3100-24 SI 2-slot Switch\r\n JD309A\r\n\r\nH3C\r\n S3100-26C-SI - model LS-S3100-26C-SI-AC-OVS\r\n 0235A15H\r\n\r\nHP\r\n A3100-26C-EPON-EI Switch\r\n JG059A\r\n\r\nHP\r\n A3100-8 SI 1-slot Switch\r\n JD310A\r\n\r\nH3C\r\n S3100-8C-SI - model LS-S3100-8C-SI-DC-OVS\r\n 0235A15J\r\n\r\nHP\r\n A5100-16G EI Switch\r\n JD351A\r\n\r\nH3C\r\n S5100-16P-EI - model LS-5100-16P-EI-OVS-H3\r\n 0235A21Q\r\n\r\nHP\r\n A5100-16G SI Switch\r\n JD356A\r\n\r\nH3C\r\n S5100-16P-SI - model LS-5100-16P-SI-OVS-H3\r\n 0235A22R\r\n\r\nHP\r\n A5100-16G-PoE EI Switch\r\n JD353A\r\n\r\nH3C\r\n S5100-16P-PWR-EI - model LS-5100-16P-PWR-EI-OVS\r\n 0235A22K\r\n\r\nHP\r\n A5100-24G EI Switch\r\n JD346A\r\n\r\nH3C\r\n S5100-24P-EI - model LS-5100-24P-EI-OVS\r\n 0235A08K\r\n\r\nHP\r\n A5100-24G EI Switch with SFP Uplink\r\n JD344A\r\n\r\nH3C\r\n S5100-26C-EI - model LS-5100-26C-EI-OVS\r\n 0235A08F\r\n\r\nHP\r\n A5100-24G SI Switch\r\n JD348A\r\n\r\nH3C\r\n S5100-24P-SI - model LS-5100-24P-SI-OVS-H3\r\n 0235A20Q\r\n\r\nHP\r\n A5100-24G-PoE EI Switch\r\n JD354A\r\n\r\nH3C\r\n S5100-26C-PWR-EI - model LS-5100-26C-PWR-EI-OVS\r\n 0235A22M\r\n\r\nHP\r\n A5100-48G EI Switch\r\n JD347A\r\n\r\nH3C\r\n S5100-48P-EI - model LS-5100-48P-EI-OVS\r\n 0235A08M\r\n\r\nHP\r\n A5100-48G EI Switch with SFP Uplink\r\n JD345A\r\n\r\nH3C\r\n S5100-50C-EI - model LS-5100-50C-EI-OVS\r\n 0235A08H\r\n\r\nHP\r\n A5100-48G SI Switch\r\n JD349A\r\n\r\nH3C\r\n S5100-48P-SI - model LS-5100-48P-SI-OVS-H3\r\n 0235A20R\r\n\r\nHP\r\n A5100-48G-PoE EI Switch\r\n JD355A\r\n\r\nH3C\r\n S5100-50C-PWR-EI - model LS-5100-50C-PWR-EI-OVS\r\n 0235A22P\r\n\r\nHP\r\n A5100-8G EI Switch\r\n JD350A\r\n\r\nH3C\r\n S5100-8P-EI - model LS-5100-8P-EI-OVS-H3\r\n 0235A21P\r\n\r\nHP\r\n A5100-8G SI Switch\r\n JD357A\r\n\r\nH3C\r\n S5100-8P-SI - model LS-5100-8P-SI-OVS-H3\r\n 0235A22T\r\n\r\nHP\r\n A5100-8G-PoE EI Switch\r\n JD352A\r\n\r\nH3C\r\n S5100-8P-PWR-EI - model LS-5100-8P-PWR-EI-OVS\r\n 0235A22H\r\n\r\nHP\r\n A5120-24G EI Switch\r\n JE066A\r\n\r\nH3C\r\n S5120-24P-EI 24GE Plus 4ComboSFP\r\n 0235A0BQ\r\n\r\nHP\r\n A5120-24G EI Switch with 2 Interface Slots\r\n JE068A\r\n\r\nH3C\r\n S5120-28C-EI 24GE Plus 4Combo Plus 2Slt\r\n 0235A0BS\r\n\r\nHP\r\n A5120-24G-PoE EI 2-slot Switch\r\n JE070A\r\n\r\nH3C\r\n S5120-28C-PWR-EI 24G Plus 4C Plus 2S Plus POE\r\n 0235A0BU\r\n\r\nHP\r\n A5120-48G EI Switch\r\n JE067A\r\n\r\nH3C\r\n S5120-48P-EI 48GE Plus 4ComboSFP\r\n 0235A0BR\r\n\r\nHP\r\n A5120-48G EI Switch with 2 Interface Slots\r\n JE069A\r\n\r\nH3C\r\n S5120-52C-EI 48GE Plus 4Combo Plus 2Slt\r\n 0235A0BT\r\n\r\nHP\r\n A5120-48G-PoE EI 2-slot Switch\r\n JE071A\r\n\r\nH3C\r\n S5120-52C-PWR-EI 48G Plus 4C Plus 2S Plus POE\r\n 0235A0BV\r\n\r\nHP\r\n A6604 Router Bundle with RPE-X1 Modules and Power Supply\r\n JE528A\r\n\r\nH3C\r\n SR6604 Router Bundle with RPE-X1 and Pow\r\n 0150A12B\r\n\r\nHP\r\n A6604 Router with 2 RPE-X1 Modules\r\n JC158A\r\n\r\nH3C\r\n RT-SR6604-OVS Plus 2 RPE-X1 Plus 2 AC-H3\r\n 0150A12C\r\n\r\nHP\r\n A6608 Router (RT-SR6608-OVS+2 RPE-X1+2 AC-H3) Bundle\r\n JE527A\r\n\r\nH3C\r\n RT-SR6608-OVS Plus 2 RPE-X1 Plus 2 AC-H3\r\n 0150A12A\r\n\r\nHP\r\n A6608 Router Bundle with RPE-X1 Modules and Power Supply\r\n JE526A\r\n\r\nH3C\r\n SR6608 Router Bundle with RPE-X1 and Pow\r\n 0150A129\r\n\r\nHP\r\n A9508 Switch Chassis\r\n JC124A\r\n\r\nH3C\r\n S9505E Chassis w/ Fans\r\n 0235A38P\r\n\r\nHP\r\n A-MSR20-15 A Multi-service Router\r\n JD670A\r\n\r\nH3C\r\n MSR 20-15 A\r\n 0235A31Q\r\n\r\nHP\r\n A-MSR20-15 AW Multi-service Router\r\n JD671A\r\n\r\nH3C\r\n MSR 20-15 A W\r\n 0235A31R\r\n\r\nHP\r\n A-MSR20-15 I Multi-service Router\r\n JD672A\r\n\r\nH3C\r\n MSR 20-15 I\r\n 0235A31N\r\n\r\nHP\r\n A-MSR20-15 IW Multi-service Router\r\n JD667A\r\n\r\nH3C\r\n MSR 20-15 IW\r\n 0235A31P\r\n\r\nHP\r\n A-MSR20-21 Router\r\n JD432A\r\n\r\nH3C\r\n MSR-20-21 Router\r\n 0235A19J\r\n\r\nHP\r\n A-MSR20-21 Router\r\n JD663A\r\n\r\nH3C\r\n MSR 20-21\r\n 0235A325\r\n\r\nHP\r\n A-MSR30-20 Multi-service Router Security Bundle\r\n JF286A\r\n\r\nH3C\r\n MSR 30-20 Router Host\r\n RTVZ33020AS, 0235A20S\r\n\r\nHP\r\n A-MSR30-40, RT-MSR3040-AC-OVS-AS-H3 Multi-service Router\r\n JF232A\r\n\r\nH3C\r\n RT-MSR3040-AC-OVS-AS-H3\r\n 0235A20V\r\n\r\nHP\r\n AR 18-31E Router\r\n JD172A\r\n\r\nH3C\r\n AR18-31E Router\r\n 0235A09T\r\n\r\nHP\r\n E4200-24 SI Switch\r\n JE013A\r\n\r\n3Com\r\n 4200-SI Switch 28 Port\r\n 3C17304A\r\n\r\nHP\r\n E4200-24G Switch\r\n JE016A\r\n\r\n3Com\r\n 4200G Switch 24-Port\r\n 3CR17661-91\r\n\r\nHP\r\n E4200-24G-PoE Switch\r\n JE020A\r\n\r\n3Com\r\n 4200G Switch PWR 24-Port\r\n 3CR17671-91\r\n\r\nHP\r\n E4200-48 SI Switch\r\n JE012A\r\n\r\n3Com\r\n 4200-SI Switch 50 Port\r\n 3C17302A\r\n\r\nHP\r\n E4200-48G Switch\r\n JE018A\r\n\r\n3Com\r\n 4200G Switch 48-Port\r\n 3CR17662-91\r\n\r\nHP\r\n E4210 8-port (TAA) Switch\r\n JE023A\r\n\r\n3Com\r\n 4210 Switch 9-Port TAA\r\n 3CR17331TAA-91\r\n\r\nHP\r\n E4210-16-PoE Switch\r\n JE031A\r\n\r\n3Com\r\n 4210 Switch PWR 18-Port\r\n 3CR17342-91\r\n\r\nHP\r\n E4210-8-PoE (TAA) Switch\r\n JE030A\r\n\r\n3Com\r\n 4210 Switch PWR 9P TAA\r\n 3CR17341TAA-91\r\n\r\nHP\r\n E4500-24G (TAA) Switch\r\n JE058A\r\n\r\n3Com\r\n 4500G Switch 24-Port TAA\r\n 3CR17761TAA-91\r\n\r\nHP\r\n E4500-24G Switch\r\n JE057A\r\n\r\n3Com\r\n 4500G Switch 24-Port\r\n 3CR17761-91\r\n\r\nHP\r\n E4500-24G-PoE (TAA) Switch\r\n JE062A\r\n\r\n3Com\r\n 4500G PWR Switch 24-Port TAA\r\n 3CR17771TAA-91\r\n\r\nHP\r\n E4500-48G (TAA) Switch\r\n JE060A\r\n\r\n3Com\r\n 4500G Switch 48-Port TAA\r\n 3CR17762TAA-91\r\n\r\nHP\r\n E4500-48G Switch\r\n JE059A\r\n\r\n3Com\r\n 4500G Switch 48-Port\r\n 3CR17762-91\r\n\r\nHP\r\n E4500-48G-PoE (TAA) Switch\r\n JE064A\r\n\r\n3Com\r\n 4500G PWR Switch 48-Port TAA\r\n 3CR17772TAA-91\r\n\r\nHP\r\n E5500-24 EI (TAA) Switch\r\n JE102A\r\n\r\n3Com\r\n TAA 5500-EI Switch 28-Port\r\n 3CR17161TAA-91\r\n\r\nHP\r\n E5500-24 SI Switch\r\n JE099A\r\n\r\n3Com\r\n SS4 5500-SI Switch 28 Port\r\n 3CR17151-91\r\n\r\nHP\r\n E5500-24 Switch\r\n JE101A\r\n\r\n3Com\r\n 5500-EI Switch 28-Port\r\n 3CR17161-91\r\n\r\nHP\r\n E5500-24G (TAA) Switch\r\n JE089A\r\n\r\n3Com\r\n TAA COMPLIANT 5500G-EI 24-Port\r\n 3CR17250TAA-91\r\n\r\nHP\r\n E5500-24G Switch\r\n JE088A\r\n\r\n3Com\r\n 5500G-EI Switch 24 Port\r\n 3CR17250-91\r\n\r\nHP\r\n E5500-24G-PoE (TAA) Switch\r\n JE093A\r\n\r\n3Com\r\n TAA COMPLIANT 5500G-EI PWR 24P\r\n 3CR17252TAA-91\r\n\r\nHP\r\n E5500-24G-PoE Switch\r\n JE092A\r\n\r\n3Com\r\n 5500G-EI Switch PWR 24-Port\r\n 3CR17252-91\r\n\r\nHP\r\n E5500-24G-SFP (TAA) Switch\r\n JE097A\r\n\r\n3Com\r\n TAA COMPLIANT 5500G-EI SFP 24P\r\n 3CR17258TAA-91\r\n\r\nHP\r\n E5500-24G-SFP Switch\r\n JE096A\r\n\r\n3Com\r\n 5500G-EI Switch SFP 24-Port\r\n 3CR17258-91\r\n\r\nHP\r\n E5500-24-PoE EI (TAA) Switch\r\n JE106A\r\n\r\n3Com\r\n TAA 5500-EI PWR Switch 28-Port\r\n 3CR17171TAA-91\r\n\r\nHP\r\n E5500-24-PoE Switch\r\n JE105A\r\n\r\n3Com\r\n 5500-EI PWR Switch 28-Port\r\n 3CR17171-91\r\n\r\nHP\r\n E5500-24-SFP Switch\r\n JE109A\r\n\r\n3Com\r\n 5500-EI Switch 28-Port FX\r\n 3CR17181-91\r\n\r\nHP\r\n E5500-24-SPF EI (TAA) Switch\r\n JE110A\r\n\r\n3Com\r\n TAA SWITCH 5500-EI 28-Port FX\r\n 3CR17181TAA-91\r\n\r\nHP\r\n E5500-48 EI (TAA) Switch\r\n JE104A\r\n\r\n3Com\r\n TAA SWITCH 5500-EI 52-Port\r\n 3CR17162TAA-91\r\n\r\nHP\r\n E5500-48 SI Switch\r\n JE100A\r\n\r\n3Com\r\n SS4 SWITCH 5500-SI 52 Port\r\n 3CR17152-91\r\n\r\nHP\r\n E5500-48 Switch\r\n JE103A\r\n\r\n3Com\r\n 5500-EI Switch 52-Port\r\n 3CR17162-91\r\n\r\nHP\r\n E5500-48G (TAA) Switch\r\n JE091A\r\n\r\n3Com\r\n TAA COMPLIANT 5500G-EI 48-Port\r\n 3CR17251TAA-91\r\n\r\nHP\r\n E5500-48G Switch\r\n JE090A\r\n\r\n3Com\r\n 5500G-EI Switch 48-Port\r\n 3CR17251-91\r\n\r\nHP\r\n E5500-48G-PoE (TAA) Switch\r\n JE095A\r\n\r\n3Com\r\n TAA COMPLIANT 5500G-EI PWR 48P\r\n 3CR17253TAA-91\r\n\r\nHP\r\n E5500-48G-PoE Switch\r\n JE094A\r\n\r\n3Com\r\n 5500G-EI PWR Switch 48-Port\r\n 3CR17253-91\r\n\r\nHP\r\n E5500-48-PoE EI (TAA) Switch\r\n JE108A\r\n\r\n3Com\r\n TAA 5500-EI PWR Switch 52-Port\r\n 3CR17172TAA-91\r\n\r\nHP\r\n E5500-48-PoE Switch\r\n JE107A\r\n\r\n3Com\r\n 5500-EI PWR Switch 52-Port\r\n 3CR17172-91\r\n\r\nHP\r\n E7902 Switch Chassis\r\n JE164A\r\n\r\n3Com\r\n S7902E Chassis Kit w/ fans\r\n 3CS7902E\r\n\r\nHP\r\n E7903 1 Fabric Slot Switch Chassis\r\n JE166A\r\n\r\n3Com\r\n S7903E-S Chassis Kit w/ fans\r\n 3CS7903ES\r\n\r\nHP\r\n E7903 Switch Chassis\r\n JE165A\r\n\r\n3Com\r\n S7903E Chassis Kit w/ fans\r\n 3CS7903E\r\n\r\nHP\r\n E7906 Switch Chassis\r\n JE167A\r\n\r\n3Com\r\n S7906E Chassis Kit w/ fans\r\n 3CS7906E\r\n\r\nHP\r\n E7906 Vertical Switch Chassis\r\n JE168A\r\n\r\n3Com\r\n S7906E-V Chassis Kit w/ fans\r\n 3CS7906EV\r\n\r\nHP\r\n F1000-E VPN Firewall Appliance\r\n JD272A\r\n\r\nH3C\r\n F1000-E VPN Firewall\r\n 0235A26G\r\n\r\nHP\r\n F1000-EI VPN Firewall Appliance\r\n JG214A\r\n\r\nHP\r\n F1000-S-EI VPN Firewall Appliance\r\n JG213A\r\n\r\nHP\r\n F5000 Firewall Main Processing Unit\r\n JG215A\r\n\r\nHP\r\n MSR 50-40 Router\r\n JD655A\r\n\r\nH3C\r\n MSR 50-40 Chassis\r\n 0235A20N\r\n\r\nHP\r\n MSR20-10 Router\r\n JD431A\r\n\r\nH3C\r\n MSR 20-10\r\n 0235A0A7\r\n\r\nHP\r\n MSR20-11 Router\r\n JD673A\r\n\r\nH3C\r\n MSR 20-11\r\n 0235A31V\r\n\r\nHP\r\n MSR20-11 Router\r\n JF239A\r\n\r\nH3C\r\n RT-MSR2011-AC-OVS-H3\r\n 0235A395\r\n\r\nHP\r\n MSR20-12 Router\r\n JD674A\r\n\r\nH3C\r\n MSR 20-12\r\n 0235A32E\r\n\r\nHP\r\n MSR20-12 Router\r\n JF241A\r\n\r\nH3C\r\n RT-MSR2012-AC-OVS-H3\r\n 0235A396\r\n\r\nHP\r\n MSR20-12-T Router\r\n JD676A\r\n\r\nH3C\r\n MSR 20-12 T1\r\n 0235A32B\r\n\r\nHP\r\n MSR20-12-T Router\r\n JF806A\r\n\r\nH3C\r\n RT-MSR2012-T-AC-OVS-H3\r\n 0235A398\r\n\r\nHP\r\n MSR20-12-T-W Router (NA)\r\n JG209A\r\n\r\nHP\r\n MSR20-12-W Router\r\n JD675A\r\n\r\nH3C\r\n MSR20-12 W\r\n 0235A32G\r\n\r\nHP\r\n MSR20-12-W Router\r\n JF807A\r\n\r\nH3C\r\n RT-MSR2012-AC-OVS-W-H3\r\n 0235A397\r\n\r\nHP\r\n MSR20-13 Router\r\n JD668A\r\n\r\nH3C\r\n MSR 20-13\r\n 0235A31W\r\n\r\nHP\r\n MSR20-13 Router\r\n JF240A\r\n\r\nH3C\r\n RT-MSR2013-AC-OVS-H3\r\n 0235A390\r\n\r\nHP\r\n MSR20-13-W Router\r\n JD669A\r\n\r\nH3C\r\n MSR 20-13 W\r\n 0235A31X\r\n\r\nHP\r\n MSR20-13-W Router\r\n JF808A\r\n\r\nH3C\r\n RT-MSR2013-AC-OVS-W-H3\r\n 0235A391\r\n\r\nHP\r\n MSR20-13-W Router (NA)\r\n JG210A\r\n\r\nHP\r\n MSR20-15 Router\r\n JF817A\r\n\r\nH3C\r\n MSR 20-15 Router Host (AC), 1 FE, 4 LSW, 1 ADSLoPOTS, 1 DSIC\r\n 0235A0A8\r\n\r\nHP\r\n MSR20-15-A Router\r\n JF237A\r\n\r\nH3C\r\n RT-MSR2015-AC-OVS-A-H3\r\n 0235A392\r\n\r\nHP\r\n MSR20-15-A-W Router\r\n JF809A\r\n\r\nH3C\r\n RT-MSR2015-AC-OVS-IW-H3\r\n 0235A38V\r\n\r\nHP\r\n MSR20-15-I Router\r\n JF236A\r\n\r\nH3C\r\n RT-MSR2015-AC-OVS-I-H3\r\n 0235A394\r\n\r\nHP\r\n MSR20-15-I-W Router\r\n JF238A\r\n\r\nH3C\r\n RT-MSR2015-AC-OVS-AW-H3\r\n 0235A393\r\n\r\nHP\r\n MSR20-20 Router\r\n JD662A\r\n\r\nHP\r\n A-MSR20-20 Router\r\n\r\nH3C\r\n MSR 20-20\r\n 0235A19H\r\n\r\nHP\r\n MSR20-20 Router\r\n JF283A\r\n\r\nH3C\r\n RT-MSR2020-AC-OVS-H3C\r\n 0235A324\r\n\r\nHP\r\n MSR20-21 Router\r\n JD663B\r\n\r\nHP\r\n MSR20-40 Router\r\n JD664A\r\n\r\nH3C\r\n MSR 20-40\r\n 0235A19K\r\n\r\nHP\r\n MSR20-40 Router\r\n JF228A\r\n\r\nH3C\r\n RT-MSR2040-AC-OVS-H3\r\n 0235A326\r\n\r\nHP\r\n MSR30-10 DC Router\r\n JG184A\r\n\r\nHP\r\n MSR30-10 Router\r\n JF816A\r\n\r\nH3C\r\n MSR 30-10 Router Host (AC), 2FE, 2SIC, 1XMIM, 256DDR\r\n 0235A39H\r\n\r\nHP\r\n MSR30-11 Router\r\n JF800A\r\n\r\nH3C\r\n RT-MSR3011-AC-OVS-H3\r\n 0235A29L\r\n\r\nHP\r\n MSR30-11E Router\r\n JG182A\r\n\r\nHP\r\n MSR30-11F Router\r\n JG183A\r\n\r\nHP\r\n MSR30-16 PoE Router\r\n JD659A\r\n\r\nH3C\r\n MSR 30-16 POE\r\n 0235A238\r\n\r\nHP\r\n MSR30-16 PoE Router\r\n JF234A\r\n\r\nH3C\r\n RT-MSR3016-AC-POE-OVS-H3\r\n 0235A321\r\n\r\nHP\r\n MSR30-16 Router\r\n JD665A\r\n\r\nH3C\r\n MSR 30-16\r\n 0235A237\r\n\r\nHP\r\n MSR30-16 Router\r\n JF233A\r\n\r\nH3C\r\n RT-MSR3016-AC-OVS-H3\r\n 0235A327\r\n\r\nHP\r\n MSR30-16 Router with VCX and 4-port FXO and 2-port FXS Modules\r\n JD025A\r\n\r\nHP\r\n A-MSR30-16 Router with VCX and 4-port FXO and 2-port FXS Modules\r\n\r\n3Com\r\n MSR 3016 VCX CPM 4FXO/2FXS Bundle\r\n 3CRBVCXMSR03A\r\n\r\nHP\r\n MSR30-16 Router with VCX Enterprise Branch Communications MIM Module\r\n JD024A\r\n\r\nHP\r\n A-MSR30-16 Router with VCX Ent MIM Module\r\n\r\n3Com\r\n MSR 3016 VCX Ent MIM Bundle\r\n 3CRBVCXMSR02A\r\n\r\nHP\r\n MSR30-20 DC Router\r\n JF235A\r\n\r\nH3C\r\n RT-MSR3020-DC-OVS-H3\r\n 0235A267\r\n\r\nHP\r\n MSR30-20 PoE Router\r\n JD660A\r\n\r\nH3C\r\n MSR 30-20 POE\r\n 0235A239\r\n\r\nHP\r\n MSR30-20 PoE Router\r\n JF802A\r\n\r\nH3C\r\n RT-MSR3020-AC-POE-OVS-H3\r\n 0235A322\r\n\r\nHP\r\n MSR30-20 Router\r\n JD666A\r\n\r\nH3C\r\n MSR 30-20\r\n 0235A19L\r\n\r\nHP\r\n MSR30-20 Router\r\n JF284A\r\n\r\nH3C\r\n MSR 30-20 Router\r\n 0235A328\r\n\r\nHP\r\n MSR30-40 DC Router\r\n JF287A\r\n\r\nH3C\r\n MSR 30-40 Router Host (DC)\r\n 0235A268\r\n\r\nHP\r\n MSR30-40 PoE Router\r\n JD661A\r\n\r\nH3C\r\n MSR 30-40 POE\r\n 0235A25R\r\n\r\nHP\r\n MSR30-40 PoE Router\r\n JF803A\r\n\r\nH3C\r\n RT-MSR3040-AC-POE-OVS-H3\r\n 0235A323\r\n\r\nHP\r\n MSR30-40 Router\r\n JD657A\r\n\r\nH3C\r\n MSR 30-40\r\n 0235A20J\r\n\r\nHP\r\n MSR30-40 Router\r\n JF229A\r\n\r\nH3C\r\n RT-MSR3040-AC-OVS-H\r\n 0235A299\r\n\r\nHP\r\n MSR30-40 Router with VCX and 8-port BRI and 4-port FXS Modules\r\n JD027A\r\n\r\n3Com\r\n MSR 3040 VCX CPM 8BRI/4FXS Bundle\r\n 3CRBVCXMSR06A\r\n\r\nHP\r\n MSR30-40 Router with VCX and 8-port FXO and 4-port FXS Modules\r\n JD026A\r\n\r\n3Com\r\n MSR 3040 VCX CPM 8FXO/4FXS Bundle\r\n 3CRBVCXMSR05A\r\n\r\nHP\r\n MSR30-40 Router with VCX and E1 and 4-port BRI and 4-port FXS Modules\r\n JD029A\r\n\r\nHP\r\n A-MSR30-40 Router with VCX and E1 and 4-port BRI and 4-port FXS Modules\r\n\r\n3Com\r\n MSR 3040 VCX CPM E1/4BRI/4FXS Bundle\r\n 3CRBVCXMSR08A\r\n\r\nHP\r\n MSR30-40 Router with VCX and T1 and 4-port FX0 and 4-port FXS Modules\r\n JD028A\r\n\r\nHP\r\n A-MSR30-40 Router with VCX and T1 and 4-port FX0 and 4-port FXS Modules\r\n\r\n3Com\r\n MSR 3040 VCX CPM T1/4FXO/4FXS Bundle\r\n 3CRBVCXMSR07A\r\n\r\nHP\r\n MSR30-40 Router with VCX MIM Module\r\n JD023A\r\n\r\n3Com\r\n MSR 3040 VCX Ent MIM Bundle\r\n 3CRBVCXMSR01A\r\n\r\nHP\r\n MSR30-60 DC Router\r\n JF801A\r\n\r\nH3C\r\n RT-MSR3060-DC-OVS-H3\r\n 0235A269\r\n\r\nHP\r\n MSR30-60 PoE Router\r\n JD654A\r\n\r\nH3C\r\n MSR 30-60 POE\r\n 0235A25S\r\n\r\nHP\r\n MSR30-60 PoE Router\r\n JF804A\r\n\r\nH3C\r\n RT-MSR3060-AC-POE-OVS-H3\r\n 0235A296\r\n\r\nHP\r\n MSR30-60 Router\r\n JD658A\r\n\r\nH3C\r\n MSR 30-60\r\n 0235A20K\r\n\r\nHP\r\n MSR30-60 Router\r\n JF230A\r\n\r\nH3C\r\n RT-MSR3060-AC-OVS-H3\r\n 0235A320\r\n\r\nHP\r\n MSR50-40 DC Router\r\n JF285A\r\n\r\nHP\r\n A-MSR50-40 DC Router Chassis\r\n\r\nH3C\r\n MSR5040-DC-OVS-H3C\r\n 0235A20P\r\n\r\nHP\r\n MSR50-40 Router\r\n JD433A\r\n\r\nH3C\r\n MSR 50-40 Router\r\n 0235A297\r\n\r\nHP\r\n MSR50-60 Router\r\n JD656A\r\n\r\nH3C\r\n MSR 50-60 Chassis\r\n 0235A20L\r\n\r\nHP\r\n MSR50-60 Router\r\n JF231A\r\n\r\nH3C\r\n RT-MSR5060-AC-OVS-H3\r\n 0235A298\r\n\r\nHP\r\n MSR50-60 Router Chassis with DC Power Supply\r\n JF640A\r\n\r\nHP\r\n MSR900 2-port FE WAN / 4 -port FE LAN Router\r\n JF812A\r\n\r\nH3C\r\n MSR 900 Router, 2 FE WAN, 4 FE LAN, 256DDR\r\n 0235A0BX\r\n\r\nHP\r\n MSR900-W Router\r\n JF814A\r\n\r\nH3C\r\n MSR 900 Router with 802.11b/g, 2 FE WAN, 4 FE LAN, 256DDR, 802.11b\r\n 0235A0C2\r\n\r\nHP\r\n MSR900-W Router (NA)\r\n JG207A\r\n\r\nHP\r\n MSR920 2-port FE WAN / 8-port FE LAN / 802.11b/g Router\r\n JF815A\r\n\r\nH3C\r\n MSR 920 Router with 802.11b/g, 2 FE WAN, 8 FE LAN, 256DDR\r\n 0235A0C4\r\n\r\nHP\r\n MSR920 Router\r\n JF813A\r\n\r\nH3C\r\n MSR 920 Router, 2 FE WAN, 8 FE LAN, 256DDR\r\n 0235A0C0\r\n\r\nHP\r\n MSR920-W Router (NA)\r\n JG208A\r\n\r\nHP\r\n 6040 Router Chassis\r\n JD967A\r\n\r\n3Com\r\n 6040 Router Chassis\r\n 3C13840\r\n\r\nHP\r\n 6080 Router Chassis\r\n JD972A\r\n\r\n3Com\r\n 6080 Router Chassis 3C13880\r\n\r\nHP\r\n S5600-26C Ethernet Switch\r\n JD393A\r\n\r\nH3C\r\n S5600-26C Ethernet Switch\r\n 0235A11F\r\n\r\nHP\r\n S5600-26C-PoE Ethernet Switch\r\n JD394A\r\n\r\nH3C\r\n S5600-26C-PWR Ethernet Switch\r\n 0235A11G\r\n\r\nHP\r\n S5600-26F Ethernet Switch\r\n JD395A\r\n\r\nH3C\r\n S5600-26F Ethernet Switch\r\n 0235A11H\r\n\r\nHP\r\n S5600-50C Ethernet Switch\r\n JD391A\r\n\r\nH3C\r\n S5600-50C Ethernet Switch\r\n 0235A11D\r\n\r\nHP\r\n S5600-50C PoE Ethernet Switch\r\n JD392A\r\n\r\nH3C\r\n S5600-50C-PWR Ethernet Switch\r\n 0235A11E\r\n\r\nHP\r\n S9502 (LS-9502-OVS-H3) Routing Switch Chassis\r\n JE551A\r\n\r\nH3C\r\n LS-9502-OVS-H3\r\n 0235A21X\r\n\r\nHP\r\n S9505 Routing Switch Chassis\r\n JC055A\r\n\r\nH3C\r\n S9505 Routing Switch Chassis\r\n 0235A17A\r\n\r\nHP\r\n S9508 Routing Switch Chassis\r\n JC054A\r\n\r\nH3C\r\n S9508 Routing Switch Chassis\r\n 0235A16T\r\n\r\nHP\r\n S9512 Routing Switch Chassis\r\n JC056A\r\n\r\nH3C\r\n S9512 Routing Switch Chassis\r\n 0235A17B\r\n\r\nHP\r\n U200-A UTM Appliance\r\n JD275A\r\n\r\nHP\r\n A-U200-A Unified Threat Management Appliance\r\n\r\nH3C\r\n SecPath U200-A\r\n 0235A36Q\r\n\r\nHP\r\n U200-S UTM Appliance\r\n JD273A\r\n\r\nHP\r\n A-U200-S Unified Threat Management Appliance\r\n\r\nH3C\r\n SecPath U200-S\r\n 0235A36N\r\n\r\nHP\r\n WX5002 Access Controller\r\n JD447A\r\n\r\nH3C\r\n WX5002 Access Controller\r\n 0235A34B\r\n\r\nHP\r\n WX5002 Access Controller\r\n JD447B\r\n\r\nHP\r\n A-WX5002 Access Controller\r\n\r\nH3C\r\n WX5002 Access Controller\r\n 0235A34B\r\n\r\nHP\r\n WX5002 Access Controller\r\n JD468A\r\n\r\n3Com\r\n WX 5002 Access Controller\r\n 3CRUWX500275\r\n\r\nHP\r\n WX5004 Access Controller\r\n JD448A\r\n\r\nHP\r\n A-WX5004 Access Controller\r\n\r\nH3C\r\n WX5004 Access Controller\r\n 0235A35J\r\n\r\nHP\r\n WX5004 Access Controller\r\n JD448B\r\n\r\nHP\r\n A-WX5004 Access Controller\r\n\r\nH3C\r\n WX5004 4-Port 1000BASE-X/1000BASE-T (Combo) Access Controller\r\n 0235A0GD\r\n\r\nHP\r\n WX5004 Access Controller\r\n JD469A\r\n\r\n3Com\r\n WX 5004 Access Controller\r\n 3CRUWX500475\r\n\r\nHP\r\n WX6103 Access Controller Support up to 128 Access Points\r\n JF247A\r\n\r\nBACKGROUND\r\n\r\nCVSS 2.0 Base Metrics\r\n===========================================================\r\n Reference Base Vector Base Score\r\nCVE-2012-3268 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3\r\n===========================================================\r\n Information on CVSS is documented\r\n in HP Customer Notice: HPSN-2008-002\r\n\r\nThe Hewlett-Packard Company thanks Kurt Grutzmacher (grutz@jingojango.net)\r\nand CERT/CC for reporting these vulnerabilities to security-alert@hp.com\r\n\r\nRESOLUTION\r\n\r\nIf your product is listed as vulnerable, a software update to address this\r\nissue may be available for download.\r\n\r\nUsing a web browser, go to http://www.hp.com/networking/support .\r\n\r\nEnter the product number or product description into Auto Search.\r\n\r\nSelect the displayed result and click ' Display selected '.\r\n\r\nClick Software Downloads from the list of choices provided below.\r\n\r\nThere is a section called ' Early Availability ' which will contain software\r\nthat addresses this issue. The descriptive text of the software should\r\nindicate SSRT100920 as a further indication that the software addresses this\r\nissue. There are important considerations about using Early Availability\r\nsoftware:\r\n\r\nEarly Availability software is recommended for use in:\r\n\r\nLab testing prior to upgrading a production network\r\n\r\nEvaluation of new features prior to general deployment\r\n\r\nEvaluation with specific applications prior to wider deployment\r\n\r\nPlease evaluate this software thoroughly prior to deployment in a production\r\nenvironment.\r\n\r\nIf your product is listed as vulnerable and software is not available via the\r\nprocess outlined previously, you may contact HP Networking support directly\r\nby going to this URL:\r\nhttps://h10145.www1.hp.com/help/Help_ContactInfo.aspx?cwp=2&SelectedTab=2 and\r\nclicking on your location to get the technical support telephone number.\r\nThere are other support options such as Electronic Case submission available.\r\n\r\nIf your product is listed as vulnerable and a software update is not yet\r\navailable, HP is currently working to address these vulnerabilities with a\r\nnew software update. This Security Bulletin will be revised when the software\r\nupdate is available. Prior to the update being made available and you have an\r\nimpacted product, the following mitigations are recommended:\r\n\r\nMoving to SNMPv3 with authentication and privacy for all network management\r\napplications.\r\n\r\nUsing SNMPv3s VACM to block access to the H3C-USER-MIB for SNMPv1/v2c users.\r\n\r\nHere is an example configuration using the snmp-agent command:\r\n\r\nsnmp-agent mib-view include readView iso\r\nsnmp-agent mib-view exclude readView hh3cUserPassword\r\nsnmp-agent mib-view include writeView iso\r\nsnmp-agent mib-view exclude writeView hh3cUserPassword\r\nsnmp-agent mib-view include notifyView iso\r\nsnmp-agent group v1 testV1ReadGroup read-view readView\r\nsnmp-agent usm-user v1 testV1ReadUser testV1ReadGroup\r\nsnmp-agent group v1 testV1WriteGroup read-view readView write-view writeView\r\nnotify-view notifyView\r\nsnmp-agent usm-user v1 testV1WriteUser testV1WriteGroup\r\nsnmp-agent community read testV1ReadUser mib-view readView\r\nsnmp-agent community write testV1WriteUser mib-view writeView\r\nYou may also further control SNMP MIB access using an ACL.\r\nFor v1/2\r\nsnmp-agent community write testV1WriteUser mib-view writeView acl\r\n<acl-number>\r\nsnmp-agent community read testV1ReadUser mib-view readView acl <acl-number>\r\nFor v3\r\nsnmp-agent group v3 testV3Group privacy read-view readView write-view\r\nwriteView acl <acl-number>\r\nsnmp-agent usm-user v3 testV3User testV3Group authentication-mode sha\r\n<auth-passwd> privacy-mode aes128 <priv-password>\r\n\r\nConfigure SNMP community strings with ACLs to limit access to SNMP to just\r\nnetwork management workstation(s).\r\n\r\nHere is an example configuration:\r\n\r\n#\r\nacl number 2001\r\nrule 1 permit source 192.168.100.0 0.0.0.255\r\nrule 1 permit source 192.168.100.1 0\r\nacl number 2002\r\nrule 1 permit source 192.168.100.1 0\r\n#\r\nsnmp-agent community read READONLY acl 2001\r\nsnmp-agent community write READONLY acl 2002\r\n#\r\n\r\nDisable all local user administrative accounts and use RADIUS or TACACS+\r\nauthentication instead.\r\n\r\nDisable SNMP.\r\n\r\nRegarding secure use of switch or router configuration information:\r\n\r\nAvoid using plaintext protocols such as TFTP or FTP to transfer configuration\r\nfiles that contain local user accounts.\r\n\r\nControl user privileges on displaying any configuration information or\r\ndisplaying the content of a configuration file. For example, display\r\ncurrent-configuration or more <configuration file> '.\r\n\r\nHISTORY\r\nVersion:1 (rev.1) - 22 October 2012 Initial release\r\nVersion:2 (rev.2) - 25 October 2012 Updated product list and the summary\r\nsection.\r\n\r\nThird Party Security Patches: Third party security patches that are to be\r\ninstalled on systems running HP software products should be applied in\r\naccordance with the customer's patch management policy.\r\n\r\nSupport: For issues about implementing the recommendations of this Security\r\nBulletin, contact normal HP Services support channel. For other issues about\r\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com.\r\n\r\nReport: To report a potential security vulnerability with any HP supported\r\nproduct, send Email to: security-alert@hp.com\r\n\r\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\r\nalerts via Email:\r\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\r\n\r\nSecurity Bulletin List: A list of HP Security Bulletins, updated\r\nperiodically, is contained in HP Security Notice HPSN-2011-001:\r\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\r\ndocDisplay?docId=emr_na-c02964430\r\n\r\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\r\navailable here:\r\nhttp://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\r\n\r\nSoftware Product Category: The Software Product Category is represented in\r\nthe title by the two characters following HPSB.\r\n\r\n3C = 3COM\r\n3P = 3rd Party Software\r\nGN = HP General Software\r\nHF = HP Hardware and Firmware\r\nMP = MPE/iX\r\nMU = Multi-Platform Software\r\nNS = NonStop Servers\r\nOV = OpenVMS\r\nPI = Printing and Imaging\r\nPV = ProCurve\r\nST = Storage Software\r\nTU = Tru64 UNIX\r\nUX = HP-UX\r\n\r\nCopyright 2012 Hewlett-Packard Development Company, L.P.\r\nHewlett-Packard Company shall not be liable for technical or editorial errors\r\nor omissions contained herein. The information provided is provided "as is"\r\nwithout warranty of any kind. To the extent permitted by law, neither HP or\r\nits affiliates, subcontractors or suppliers will be liable for\r\nincidental,special or consequential damages including downtime cost; lost\r\nprofits;damages relating to the procurement of substitute products or\r\nservices; or damages for loss of data, or software restoration. The\r\ninformation in this document is subject to change without notice.\r\nHewlett-Packard Company and the names of Hewlett-Packard products referenced\r\nherein are trademarks of Hewlett-Packard Company in the United States and\r\nother countries. Other product and company names mentioned herein may be\r\ntrademarks of their respective owners.\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.12 (GNU/Linux)\r\n\r\niEYEARECAAYFAlCJl+QACgkQ4B86/C0qfVl9cgCcDoJkIjTWzBdeJdAdOimzRNg7\r\nYJgAoPmQ5ycXX07g21tV9nvSaLLvPPE5\r\n=cmPB\r\n-----END PGP SIGNATURE-----\r\n", "cvss3": {}, "published": "2012-10-28T00:00:00", "type": "securityvulns", "title": "[security bulletin] HPSBHF02819 SSRT100920 rev.2 - HP, 3COM, and H3C Routers & Switches, Remote Disclosure of Information", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2012-3268"], "modified": "2012-10-28T00:00:00", "id": "SECURITYVULNS:DOC:28681", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28681", "sourceData": "", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:49", "description": "Information leakage via SNMP.", "cvss3": {}, "published": "2012-10-28T00:00:00", "type": "securityvulns", "title": "HP/H3C / Huawei equipment information leakage", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2012-3268"], "modified": "2012-10-28T00:00:00", "id": "SECURITYVULNS:VULN:12667", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12667", "sourceData": "", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2023-01-11T14:32:04", "description": "The remote host allows SNMP read-only access to either h3c-user.mib or hh3c-user.mib. These MIBs contain information such as usernames, passwords, and user privileges. A remote attacker with a valid read-only community string could exploit this to enumerate usernames and passwords, which could lead to administrative access to the device.", "cvss3": {}, "published": "2012-10-30T00:00:00", "type": "nessus", "title": "HP/H3C and Huawei SNMP User Data Information Disclosure", "bulletinFamily": "scanner", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-3268"], "modified": "2019-12-04T00:00:00", "cpe": [], "id": "SNMP_H3C_INFO_LEAK.NASL", "href": "https://www.tenable.com/plugins/nessus/62759", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(62759);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/12/04\");\n\n script_cve_id(\"CVE-2012-3268\");\n script_bugtraq_id(56183);\n script_xref(name:\"CERT\", value:\"225404\");\n\n script_name(english:\"HP/H3C and Huawei SNMP User Data Information Disclosure\");\n script_summary(english:\"Tries to enumerate the list of users\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote networking device has an information disclosure\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host allows SNMP read-only access to either h3c-user.mib or\nhh3c-user.mib. These MIBs contain information such as usernames,\npasswords, and user privileges. A remote attacker with a valid\nread-only community string could exploit this to enumerate usernames and\npasswords, which could lead to administrative access to the device.\");\n # http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?a4b8d1ca\");\n # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c03515685\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c3459f50\");\n script_set_attribute(attribute:\"solution\", value:\n\"For HP devices, install the appropriate software update to fix this\nissue. If an update is not available, use one of the workarounds listed\nin the referenced advisories.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2012-3268\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_nessus\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/10/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/10/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/10/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SNMP\");\n\n script_copyright(english:\"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"snmp_settings.nasl\", \"snmp_sysDesc.nasl\");\n script_require_keys(\"SNMP/community\", \"SNMP/sysDesc\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"snmp_func.inc\");\n\nsysdesc = get_kb_item_or_exit(\"SNMP/sysDesc\");\nif (sysdesc !~ 'H3C|Huawei')\n audit(AUDIT_HOST_NOT, 'a H3C or Huawei device');\n\ncommunity = get_kb_item_or_exit(\"SNMP/community\");\nport = get_kb_item(\"SNMP/port\");\nif (!port) port = 161;\n\nif (!get_udp_port_state(port))\n audit(AUDIT_PORT_CLOSED, port, 'UDP');\n\noids = make_list(\n '1.3.6.1.4.1.2011.10.2.12.1.1.1.1', # h3cUserName (old)\n '1.3.6.1.4.1.25506.2.12.1.1.1.1' # hh3cUserName (new)\n);\n\nforeach oid (oids)\n{\n soc = open_sock_udp(port);\n if (!soc)\n audit(AUDIT_SOCK_FAIL, port, 'UDP');\n \n users = scan_snmp_string(socket:soc, community:community, oid:oid);\n close(soc);\n \n if (strlen(users))\n {\n if (report_verbosity > 0)\n {\n report = '\\nNessus was able to get a list of users :\\n\\n' + users;\n security_hole(port:port, extra:report, protocol:\"udp\");\n }\n else security_hole(port:port, protocol:\"udp\");\n\n exit(0);\n }\n}\n\naudit(AUDIT_HOST_NOT, 'affected');\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}], "huawei": [{"lastseen": "2021-12-30T12:28:07", "description": "In some of Huawei products as affected products list below, there are MIBs which support the query of the local user account and password. However, the security authentication protection for SNMP V1 and V2 is not enough, which leads to the risk that the user account and password can be disclosed through SNMP (HWNSIRT-2012-1017).\n\nThis Vulnerability has been assigned Common Vulnerabilities and Exposures (CVE) ID: CVE-2012-3268. \n", "edition": 1, "cvss3": {}, "published": "2012-10-25T00:00:00", "type": "huawei", "title": "Security Advisory - SNMP vulnerability on Huawei multiple products", "bulletinFamily": "software", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-3268"], "modified": "2013-03-18T00:00:00", "id": "HUAWEI-SA-20121025-01", "href": "https://www.huawei.com/en/psirt/security-advisories/2015/hw-197483", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}], "cve": [{"lastseen": "2023-02-09T14:06:25", "description": "Certain HP Access Controller, Fabric Module, Firewall, Router, Switch, and UTM Appliance products; certain HP 3Com Access Controller, Router, and Switch products; certain HP H3C Access Controller, Firewall, Router, Switch, and Switch and Route Processing Unit products; and certain Huawei Firewall/Gateway, Router, Switch, and Wireless products do not properly implement access control as defined in h3c-user.mib 2.0 and hh3c-user.mib 2.0, which allows remote authenticated users to discover credentials in UserInfoEntry values via an SNMP request with the read-only community.", "cvss3": {}, "published": "2013-02-01T11:49:00", "type": "cve", "title": "CVE-2012-3268", "cwe": ["CWE-522"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-3268"], "modified": "2021-04-06T13:32:00", "cpe": ["cpe:/h:hp:lsr1fw2a1:-", "cpe:/h:hp:0235a10d:-", "cpe:/h:hp:jd307a:-", "cpe:/h:hp:3cr17332-91:-", "cpe:/h:hp:je059a:-", "cpe:/h:hp:je093a:-", "cpe:/h:hp:je072a:-", "cpe:/h:hp:jd665a:-", "cpe:/h:hp:jf242a:-", "cpe:/h:hp:0235a0gd:-", "cpe:/h:hp:jd312a:-", "cpe:/h:hp:0235a31e:-", "cpe:/h:hp:jd011a:-", "cpe:/h:hp:jd025a:-", "cpe:/h:hp:0235a22c:-", "cpe:/h:hp:jd348a:-", "cpe:/h:hp:jr431b:-", "cpe:/h:hp:0235a321:-", "cpe:/h:hp:0235a22e:-", "cpe:/h:hp:jf813a:-", "cpe:/h:hp:jd349a:-", "cpe:/h:hp:0235a27d:-", "cpe:/h:hp:je198a:-", "cpe:/h:hp:3cr17671-91:-", "cpe:/h:hp:jf247a:-", "cpe:/h:hp:0235a0e3:-", "cpe:/h:huawei:ne5000e:v300r007", "cpe:/h:hp:jd007a:-", "cpe:/h:hp:0235a37x:-", "cpe:/h:hp:jd676a:-", "cpe:/h:hp:3c13636:-", "cpe:/h:hp:jd304a:-", "cpe:/h:hp:3cr17762-91:-", "cpe:/h:hp:jd346a:-", "cpe:/h:hp:jd663b:-", "cpe:/h:hp:0235a0ct:-", "cpe:/h:hp:jf286a:-", "cpe:/h:hp:jc699a:-", "cpe:/h:hp:0231a65t:-", "cpe:/h:hp:jd316a:-", "cpe:/h:hp:0235a324:-", "cpe:/h:hp:jd238a:-", "cpe:/h:hp:0235a0bs:-", "cpe:/h:hp:jd376a:-", "cpe:/h:hp:jd378a:-", "cpe:/h:hp:jg304a:-", "cpe:/h:hp:jg301a:-", "cpe:/h:hp:jc178b:-", "cpe:/h:hp:0235a19h:-", "cpe:/h:hp:3crs42g-24p-91:-", "cpe:/h:hp:jc124b:-", "cpe:/h:hp:jd972a:-", "cpe:/h:hp:jf427a:-", "cpe:/h:hp:jg256a:-", "cpe:/h:hp:jc653a:-", "cpe:/h:hp:3crbsg28hpwr93:-", "cpe:/h:huawei:ne5000e:v800r003", "cpe:/h:hp:jd922a:-", "cpe:/h:hp:0235a0gf:-", "cpe:/h:hp:0235a16t:-", "cpe:/h:hp:0235a0g0:-", "cpe:/h:hp:lsq1srpd0:-", "cpe:/h:hp:0231a761:-", "cpe:/h:huawei:ne5000e:v800r002", "cpe:/h:hp:jd023a:-", "cpe:/h:hp:3cr17343-91:-", "cpe:/h:hp:jg207a:-", "cpe:/h:hp:3cr17161taa-91:-", "cpe:/h:hp:0235a23t:-", "cpe:/h:hp:jc101a:-", "cpe:/h:hp:0235a20k:-", "cpe:/h:hp:0235a392:-", "cpe:/h:hp:0235a396:-", "cpe:/h:hp:jf815a:-", "cpe:/h:huawei:me60:v600r002", "cpe:/h:hp:jf846a:-", "cpe:/h:hp:je074a:-", "cpe:/h:hp:jg253a:-", "cpe:/h:hp:jd657a:-", "cpe:/h:hp:0235a10c:-", "cpe:/h:hp:jf844a:-", "cpe:/h:hp:jg257a:-", "cpe:/h:hp:0235a19l:-", "cpe:/h:hp:jg214a:-", "cpe:/h:hp:jd337a:-", "cpe:/h:hp:3cruwx500475:-", "cpe:/h:hp:3cr17181-91:-", "cpe:/h:hp:0235a42d:-", "cpe:/h:hp:0235a0g7:-", "cpe:/h:hp:jd450a:-", "cpe:/h:hp:3cr17250taa-91:-", "cpe:/h:hp:0235a238:-", "cpe:/h:hp:0231a832:-", "cpe:/h:hp:jd172a:-", "cpe:/h:hp:jf236a:-", "cpe:/h:hp:jd357a:-", "cpe:/h:hp:jg478a:-", "cpe:/h:hp:jg300a:-", "cpe:/h:hp:0235a22f:-", "cpe:/h:hp:jd250a:-", "cpe:/h:huawei:ne20e-x6:v600r003", "cpe:/h:hp:jd447a:-", "cpe:/h:hp:3crs45g-24-91:-", "cpe:/h:hp:je109a:-", "cpe:/h:hp:0235a14w:-", "cpe:/h:hp:jd354a:-", "cpe:/h:hp:jd353a:-", "cpe:/h:hp:jf229a:-", "cpe:/h:hp:3cr17341-91:-", "cpe:/h:hp:jg092a:-", "cpe:/h:hp:jd194a:-", "cpe:/h:hp:0235a22t:-", "cpe:/h:hp:0235a0g9:-", "cpe:/h:hp:je545a:-", "cpe:/h:hp:3cr17761-91:-", "cpe:/h:hp:0235a29y:-", "cpe:/h:hp:jc474a:-", "cpe:/h:hp:0235a298:-", "cpe:/h:hp:3c17302a:-", "cpe:/h:hp:jd656a:-", "cpe:/h:hp:0235a14v:-", "cpe:/h:hp:3crbvcxmsr07a:-", "cpe:/h:hp:0235a38r:-", "cpe:/h:hp:jd943a:-", "cpe:/h:hp:0235a38p:-", "cpe:/h:hp:0235a237:-", "cpe:/h:hp:3c13613:-", "cpe:/h:hp:jd669a:-", "cpe:/h:hp:jd921a:-", "cpe:/h:hp:juc653a:-", "cpe:/h:hp:jc748a:-", "cpe:/h:hp:0235a395:-", "cpe:/h:hp:0235a10l:-", "cpe:/h:hp:jc611a:-", "cpe:/h:hp:0235a20n:-", "cpe:/h:hp:jg242a:-", "cpe:/h:hp:0235a23h:-", "cpe:/h:hp:jd243b:-", "cpe:/h:hp:3crs48g-24p-91:-", "cpe:/h:hp:3cr17171taa-91:-", "cpe:/h:hp:0231a88l:-", "cpe:/h:hp:jd318a:-", "cpe:/h:hp:jd664a:-", "cpe:/h:hp:0235a22r:-", "cpe:/h:hp:0231a0av:-", "cpe:/h:hp:je110a:-", "cpe:/h:hp:jd674a:-", "cpe:/h:hp:je107a:-", "cpe:/h:hp:je008a:-", "cpe:/h:hp:jd661a:-", "cpe:/h:hp:0235a38v:-", "cpe:/h:hp:jd468a:-", "cpe:/h:hp:jg255a:-", "cpe:/h:hp:3crbsg2893:-", "cpe:/h:hp:je023a:-", "cpe:/h:hp:0235a20l:-", "cpe:/h:hp:lsq1fwbsc0:-", "cpe:/h:hp:3c13840:-", "cpe:/h:hp:jc150b:-", "cpe:/h:hp:0235a39h:-", "cpe:/h:hp:0235a10j:-", "cpe:/h:hp:jd274a:-", "cpe:/h:hp:3cr17251taa-91:-", "cpe:/h:hp:je021a:-", "cpe:/h:hp:0235a0g6:-", "cpe:/h:hp:0235a22h:-", "cpe:/h:huawei:ne20:v200r005", "cpe:/h:hp:3cr17172-91:-", "cpe:/h:hp:jc698a:-", "cpe:/h:hp:0235a38q:-", "cpe:/h:hp:jd315a:-", "cpe:/h:hp:jd303a:-", "cpe:/h:hp:3crs48g-24-91:-", "cpe:/h:hp:jg182a:-", "cpe:/h:hp:0235a10h:-", "cpe:/h:hp:3cr17250-91:-", "cpe:/h:hp:0235a17b:-", "cpe:/h:hp:jd308a:-", "cpe:/h:hp:3cr17334-91:-", "cpe:/h:hp:jc148b:-", "cpe:/h:hp:3c13751:-", "cpe:/h:huawei:-ma5200g:v300r003", "cpe:/h:hp:jd658a:-", "cpe:/h:hp:0150a12c:-", "cpe:/h:hp:jd245a:-", "cpe:/h:hp:jd241b:-", "cpe:/h:hp:je201a:-", "cpe:/h:hp:je094a:-", "cpe:/h:hp:je018a:-", "cpe:/h:hp:jg209a:-", "cpe:/h:hp:3c17543:-", "cpe:/h:hp:3cr17562-91:-", "cpe:/h:hp:jf817a:-", "cpe:/h:hp:je031a:-", "cpe:/h:hp:jd311a:-", "cpe:/h:hp:jg249a:-", "cpe:/h:hp:jd305a:-", "cpe:/h:hp:jd444a:-", "cpe:/h:hp:jd319b:-", "cpe:/h:hp:0235a32g:-", "cpe:/h:hp:jg213a:-", "cpe:/h:hp:0235a36q:-", "cpe:/h:hp:jg248a:-", "cpe:/h:hp:0235a38n:-", "cpe:/h:hp:jd326a:-", "cpe:/h:hp:0235a32e:-", "cpe:/h:huawei:ma5200g:v200r003", "cpe:/h:hp:jd918a:-", "cpe:/h:hp:je089a:-", "cpe:/h:hp:jd345a:-", "cpe:/h:hp:jd193b:-", "cpe:/h:hp:0235a08m:-", "cpe:/h:huawei:ne40e\\&80e:v600r002", "cpe:/h:hp:0235a22k:-", "cpe:/h:hp:jf233a:-", "cpe:/h:hp:0235a0bq:-", "cpe:/h:hp:jf241a:-", "cpe:/h:hp:je528a:-", "cpe:/h:huawei:cx600:v600r003", "cpe:/h:hp:jf237a:-", "cpe:/h:hp:je062a:-", "cpe:/h:hp:jd313a:-", "cpe:/h:hp:jf431c:-", "cpe:/h:hp:jg315a:-", "cpe:/h:hp:jc700a:-", "cpe:/h:hp:jf285a:-", "cpe:/h:hp:3cr17151-91:-", "cpe:/h:hp:jd240a:-", "cpe:/h:hp:jd243a:-", "cpe:/h:hp:0235a397:-", "cpe:/h:hp:jg241a:-", "cpe:/h:hp:3c13701:-", "cpe:/h:hp:3cr17253taa-91:-", "cpe:/h:hp:jd334a:-", "cpe:/h:hp:jf234a:-", "cpe:/h:hp:je022a:-", "cpe:/h:hp:je069a:-", "cpe:/h:hp:jd370a:-", "cpe:/h:hp:je101a:-", "cpe:/h:hp:3cr17251-91:-", "cpe:/h:hp:jg223a:-", "cpe:/h:hp:0235a297:-", "cpe:/h:hp:0235a10g:-", "cpe:/h:hp:jd320b:-", "cpe:/h:hp:3cr17341a-91:-", "cpe:/h:hp:0235a0ge:-", "cpe:/h:hp:0235a31b:-", "cpe:/h:hp:jc566a:-", "cpe:/h:hp:jf807a:-", "cpe:/h:hp:0235a0g3:-", "cpe:/h:hp:jc099a:-", "cpe:/h:hp:jd431a:-", "cpe:/h:hp:jd331a:-", "cpe:/h:huawei:atb:v200r001c00", "cpe:/h:hp:jc086a:-", "cpe:/h:huawei:ne40e\\&80e:v600r003", "cpe:/h:hp:jd317a:-", "cpe:/h:hp:jd273a:-", "cpe:/h:hp:jd433a:-", "cpe:/h:hp:jf803a:-", "cpe:/h:hp:je029a:-", "cpe:/h:hp:3crbsg28pwr93:-", "cpe:/h:hp:0231a86p:-", "cpe:/h:huawei:me60:v100r005", "cpe:/h:hp:jc176a:-", "cpe:/h:hp:jd351a:-", "cpe:/h:hp:3cr17561-91:-", "cpe:/h:hp:jc697a:-", "cpe:/h:hp:jc148a:-", "cpe:/h:hp:0150a129:-", "cpe:/h:hp:jg208a:-", "cpe:/h:hp:jd333a:-", "cpe:/h:hp:jd318b:-", "cpe:/h:hp:jd671a:-", "cpe:/h:hp:jd347a:-", "cpe:/h:hp:je067a:-", "cpe:/h:hp:0235a26g:-", "cpe:/h:hp:0235a19j:-", "cpe:/h:hp:jf239a:-", "cpe:/h:hp:je102a:-", "cpe:/h:hp:jd469a:-", "cpe:/h:hp:jg237a:-", "cpe:/h:hp:0235a41d:-", "cpe:/h:hp:je030a:-", "cpe:/h:hp:jf430a:-", "cpe:/h:hp:3cr17331taa-91:-", "cpe:/h:hp:jd369a:-", "cpe:/h:hp:0235a393:-", "cpe:/h:hp:jd670a:-", "cpe:/h:hp:3crbvcxmsr05a:-", "cpe:/h:hp:0235a0e7:-", "cpe:/h:hp:3cr17333-91:-", "cpe:/h:hp:jg254a:-", "cpe:/h:hp:je046a:-", "cpe:/h:hp:jc165a:-", "cpe:/h:hp:3cr17254-91:-", "cpe:/h:hp:jd675a:-", "cpe:/h:hp:jd241a:-", "cpe:/h:hp:jd309a:-", "cpe:/h:hp:je005a:-", "cpe:/h:hp:jg311a:-", "cpe:/h:hp:jg250a:-", "cpe:/h:hp:3crbvcxmsr06a:-", "cpe:/h:hp:jc056a:-", "cpe:/h:huawei:me60:v600r005c00spc600", "cpe:/h:hp:0235a15f:-", "cpe:/h:hp:jc054a:-", "cpe:/h:hp:jd268a:-", "cpe:/h:hp:je073a:-", "cpe:/h:hp:je063a:-", "cpe:/h:hp:jc694a:-", "cpe:/h:hp:je066a:-", "cpe:/h:hp:0235a269:-", "cpe:/h:huawei:atn:v200r001c01", "cpe:/h:hp:3crbvcxmsr01a:-", "cpe:/h:hp:0235a0bu:-", "cpe:/h:hp:jd375a:-", "cpe:/h:hp:3cs7903es:-", "cpe:/h:hp:jf804a:-", "cpe:/h:hp:0235a31v:-", "cpe:/h:hp:0235a32x:-", "cpe:/h:hp:3cs7906ev:-", "cpe:/h:hp:jd967a:-", "cpe:/h:hp:jg184a:-", "cpe:/h:hp:jg349a:-", "cpe:/h:hp:0235a248:-", "cpe:/h:hp:je020a:-", "cpe:/h:hp:3c13641:-", "cpe:/h:huawei:ne40e\\&80e:v300r003", "cpe:/h:hp:3cr17181taa-91:-", "cpe:/h:hp:jg312a:-", "cpe:/h:hp:0235a35j:-", "cpe:/h:hp:jg258a:-", "cpe:/h:hp:jc666a:-", "cpe:/h:hp:0235a394:-", "cpe:/h:hp:0235a323:-", "cpe:/h:hp:0235a37t:-", "cpe:/h:hp:0235a10k:-", "cpe:/h:hp:0235a31q:-", "cpe:/h:hp:jg252a:-", "cpe:/h:hp:je007a:-", "cpe:/h:hp:0235a0ga:-", "cpe:/h:hp:0235a25n:-", "cpe:/h:hp:jd432a:-", "cpe:/h:hp:3c13759:-", "cpe:/h:hp:je097a:-", "cpe:/h:hp:0235a08f:-", "cpe:/h:huawei:cx600:v600r001", "cpe:/h:hp:3cr17661-91:-", "cpe:/h:hp:jf430c:-", "cpe:/h:hp:3c17540taa:-", "cpe:/h:hp:je060a:-", "cpe:/h:hp:jc178a:-", "cpe:/h:hp:je090a:-", "cpe:/h:hp:jc474b:-", "cpe:/h:hp:0235a31p:-", "cpe:/h:hp:jd356a:-", "cpe:/h:hp:0235a391:-", "cpe:/h:hp:jf284a:-", "cpe:/h:hp:3cr17152-91:-", "cpe:/h:hp:jd320a:-", "cpe:/h:hp:3cr17762taa-91:-", "cpe:/h:hp:jc150a:-", "cpe:/h:hp:jf800a:-", "cpe:/h:hp:jf847a:-", "cpe:/h:hp:3crs42g-48-91:-", "cpe:/h:hp:3cr17331a-91:-", "cpe:/h:hp:jd310a:-", "cpe:/h:hp:jd306a:-", "cpe:/h:hp:jd010a:-", "cpe:/h:hp:3c17543taa:-", "cpe:/h:hp:je164a:-", "cpe:/h:hp:jd338a:-", "cpe:/h:hp:3crs45g-48-91:-", "cpe:/h:hp:jd379a:-", "cpe:/h:hp:jc701a:-", "cpe:/h:hp:0235aa2m:-", "cpe:/h:hp:jg246a:-", "cpe:/h:hp:je526a:-", "cpe:/h:hp:0235a20p:-", "cpe:/h:hp:jg251a:-", "cpe:/h:hp:jg236a:-", "cpe:/h:hp:0235a36n:-", "cpe:/h:hp:3cr17772-91:-", "cpe:/h:hp:jf808a:-", "cpe:/h:hp:jf238a:-", "cpe:/h:hp:je165a:-", "cpe:/h:hp:jd448a:-", "cpe:/h:hp:jc149b:-", "cpe:/h:hp:3crbsg2093:-", "cpe:/h:hp:3cr17662-91:-", "cpe:/h:hp:0235a10b:-", "cpe:/h:hp:jd239b:-", "cpe:/h:hp:jf235a:-", "cpe:/h:hp:jc100a:-", "cpe:/h:hp:0235a0as:-", "cpe:/h:hp:0235a29l:-", "cpe:/h:hp:3c13612:-", "cpe:/h:hp:jd374a:-", "cpe:/h:hp:je064a:-", "cpe:/h:hp:0235a19k:-", "cpe:/h:hp:0235a268:-", "cpe:/h:hp:0235a398:-", "cpe:/h:hp:0235a327:-", "cpe:/h:hp:jd249a:-", "cpe:/h:hp:jd329a:-", "cpe:/h:hp:0235a20s:-", "cpe:/h:hp:jf802a:-", "cpe:/h:hp:jd667a:-", "cpe:/h:hp:jd328a:-", "cpe:/h:hp:0235a20v:-", "cpe:/h:hp:jd330a:-", "cpe:/h:hp:0235a0a7:-", "cpe:/h:hp:3crs48g-48p-91:-", "cpe:/h:hp:jf801a:-", "cpe:/h:hp:jc177a:-", "cpe:/h:hp:0235a0g8:-", "cpe:/h:hp:je105a:-", "cpe:/h:hp:je045a:-", "cpe:/h:hp:0235a31w:-", "cpe:/h:huawei:ne40e\\&80e:v600r001", "cpe:/h:hp:jg240a:-", "cpe:/h:hp:jd377a:-", "cpe:/h:hp:jf814a:-", "cpe:/h:hp:jd314a:-", "cpe:/h:hp:je204a:-", "cpe:/h:hp:jd325a:-", "cpe:/h:hp:jd327a:-", "cpe:/h:hp:jg247a:-", "cpe:/h:hp:jd449a:-", "cpe:/h:hp:jg299a:-", "cpe:/h:hp:jg348a:-", "cpe:/h:hp:je070a:-", "cpe:/h:hp:jg091a:-", "cpe:/h:hp:jf283a:-", "cpe:/h:hp:je200a:-", "cpe:/h:hp:je026a:-", "cpe:/h:hp:3crbvcxmsr03a:-", "cpe:/h:hp:0235a22p:-", "cpe:/h:hp:jc147b:-", "cpe:/h:hp:jg350a:-", "cpe:/h:hp:je048a:-", "cpe:/h:hp:je028a:-", "cpe:/h:hp:je092a:-", "cpe:/h:hp:0235a299:-", "cpe:/h:hp:jd666a:-", "cpe:/h:hp:3cr17771taa-91:-", "cpe:/h:hp:jc055a:-", "cpe:/h:huawei:cx600:v600r002", "cpe:/h:hp:0235a320:-", "cpe:/h:hp:0235a31r:-", "cpe:/h:hp:jg239a:-", "cpe:/h:hp:0235a27s:-", "cpe:/h:hp:jf812a:-", "cpe:/h:hp:jd009a:-", "cpe:/h:hp:je100a:-", "cpe:/h:hp:0235a301:-", "cpe:/h:hp:jd659a:-", "cpe:/h:hp:jd344a:-", "cpe:/h:hp:jd916a:-", "cpe:/h:hp:je095a:-", "cpe:/h:hp:0235a0c0:-", "cpe:/h:hp:jd350a:-", "cpe:/h:hp:0235a19c:-", "cpe:/h:hp:jd332a:-", "cpe:/h:hp:jd024a:-", "cpe:/h:hp:jd275a:-", "cpe:/h:hp:0235a31n:-", "cpe:/h:hp:3c17540:-", "cpe:/h:hp:jd008a:-", "cpe:/h:hp:jd654a:-", "cpe:/h:hp:jf428a:-", "cpe:/h:hp:0235a08h:-", "cpe:/h:hp:je009a:-", "cpe:/h:hp:jd026a:-", "cpe:/h:hp:3cr17162-91:-", "cpe:/h:hp:0235a23p:-", "cpe:/h:hp:jd672a:-", "cpe:/h:hp:je203a:-", "cpe:/h:hp:3crs48g-48-91:-", "cpe:/h:hp:jf845a:-", "cpe:/h:hp:jd238b:-", "cpe:/h:hp:0235a0bt:-", "cpe:/h:hp:je057a:-", "cpe:/h:hp:jc104a:-", "cpe:/h:hp:jd193a:-", "cpe:/h:hp:jg059a:-", "cpe:/h:hp:je016a:-", "cpe:/h:hp:0235a0bx:-", "cpe:/h:hp:0235a19b:-", "cpe:/h:hp:0235a08k:-", "cpe:/h:huawei:me60:v600r003", "cpe:/h:hp:0235a32b:-", "cpe:/h:hp:0235a390:-", "cpe:/h:hp:jc125b:-", "cpe:/h:hp:3cr17343a-91:-", "cpe:/h:hp:jc105a:-", "cpe:/h:hp:0235a0g1:-", "cpe:/h:hp:jf552a:-", "cpe:/h:hp:jd935a:-", "cpe:/h:hp:jc085a:-", "cpe:/h:hp:jc103a:-", "cpe:/h:hp:jf551a:-", "cpe:/h:hp:jf230a:-", "cpe:/h:hp:3cr17161-91:-", "cpe:/h:hp:3crbsg5293:-", "cpe:/h:hp:0235a0c4:-", "cpe:/h:hp:jc147a:-", "cpe:/h:hp:jd668a:-", "cpe:/h:hp:je106a:-", "cpe:/h:hp:3c17541taa:-", "cpe:/h:huawei:me60:v100r006", "cpe:/h:hp:0235a29a:-", "cpe:/h:hp:jd447b:-", "cpe:/h:hp:jd448b:-", "cpe:/h:hp:jg302a:-", "cpe:/h:hp:je104a:-", "cpe:/h:hp:jg305a:-", "cpe:/h:hp:0235a10f:-", "cpe:/h:hp:jc149a:-", "cpe:/h:hp:0235a20j:-", "cpe:/h:hp:3cr17660-91:-", "cpe:/h:hp:0235a322:-", "cpe:/h:hp:je099a:-", "cpe:/h:hp:jd319a:-", "cpe:/h:hp:jd946a:-", "cpe:/h:hp:jd662a:-", "cpe:/h:hp:0235a34b:-", "cpe:/h:hp:jd029a:-", "cpe:/h:hp:jc635a:-", "cpe:/h:hp:jg183a:-", "cpe:/h:hp:0150a12b:-", "cpe:/h:hp:jd336a:-", "cpe:/h:hp:0235a21p:-", "cpe:/h:hp:je058a:-", "cpe:/h:hp:0235a0a8:-", "cpe:/h:hp:jg238a:-", "cpe:/h:hp:0235a21q:-", "cpe:/h:hp:je012a:-", "cpe:/h:hp:0235a17a:-", "cpe:/h:hp:0235a31c:-", "cpe:/h:hp:jd371a:-", "cpe:/h:hp:jd923a:-", "cpe:/h:hp:0235a300:-", "cpe:/h:hp:0235a27r:-", "cpe:/h:hp:0235a27q:-", "cpe:/h:hp:je027a:-", "cpe:/h:hp:je527a:-", "cpe:/h:hp:je025a:-", "cpe:/h:hp:jg215a:-", "cpe:/h:hp:3cr17252taa-91:-", "cpe:/h:hp:3cr17342-91:-", "cpe:/h:hp:jf231a:-", "cpe:/h:hp:jf640a:-", "cpe:/h:hp:jc613a:-", "cpe:/h:hp:je032a:-", "cpe:/h:hp:0235a09t:-", "cpe:/h:hp:jd663a:-", "cpe:/h:hp:jg307a:-", "cpe:/h:hp:jr024a:-", "cpe:/h:hp:3cr17772taa-91:-", "cpe:/h:hp:3cr17771-91:-", "cpe:/h:hp:jc158a:-", "cpe:/h:hp:0231a88a:-", "cpe:/h:hp:jd313b:-", "cpe:/h:hp:jc177b:-", "cpe:/h:hp:0235a37u:-", "cpe:/h:hp:je166a:-", "cpe:/h:hp:3cr17162taa-91:-", "cpe:/h:hp:jf806a:-", "cpe:/h:hp:jf816a:-", "cpe:/h:hp:rpe-x1:-", "cpe:/h:hp:0235a33r:-", "cpe:/h:hp:0235a0c2:-", "cpe:/h:hp:je091a:-", "cpe:/h:hp:0235a326:-", "cpe:/h:hp:3c17541:-", "cpe:/h:hp:3cr17571-91:-", "cpe:/h:hp:3cr17253-91:-", "cpe:/h:hp:3crbvcxmsr08a:-", "cpe:/h:hp:0235a15d:-", "cpe:/h:hp:jg210a:-", "cpe:/h:hp:3cruwx500275:-", "cpe:/h:hp:jd655a:-", "cpe:/h:hp:0235a20r:-", "cpe:/h:hp:0235a296:-", "cpe:/h:hp:je061a:-", "cpe:/h:hp:0235a10e:-", "cpe:/h:hp:je015a:-", "cpe:/h:hp:3cr17332a-91:-", "cpe:/h:hp:0235a19d:-", "cpe:/h:hp:jg222a:-", "cpe:/h:hp:jd272a:-", "cpe:/h:hp:3crbvcxmsr02a:-", "cpe:/h:hp:jd352a:-", "cpe:/h:hp:rtvz33020as:-", "cpe:/h:hp:je071a:-", "cpe:/h:hp:3cr17331-91:-", "cpe:/h:hp:je103a:-", "cpe:/h:hp:je033a:-", "cpe:/h:hp:je108a:-", "cpe:/h:hp:jf287a:-", "cpe:/h:hp:jd372a:-", "cpe:/h:hp:3cs7903e:-", "cpe:/h:hp:jd240b:-", "cpe:/h:hp:3cr17259-91:-", "cpe:/h:hp:0235a325:-", "cpe:/h:hp:0150a12a:-", "cpe:/h:hp:0235a0g5:-", "cpe:/h:hp:jf240a:-", "cpe:/h:huawei:ne40\\&80:v300r005", "cpe:/h:hp:jf809a:-", "cpe:/h:hp:jg303a:-", "cpe:/h:hp:jf232a:-", "cpe:/h:hp:0235a31x:-", "cpe:/h:hp:je168a:-", "cpe:/h:hp:3cs7902e:-", "cpe:/h:hp:0235a0g4:-", "cpe:/h:hp:0235a0br:-", "cpe:/h:hp:3cr17258taa-91:-", "cpe:/h:hp:jf228a:-", "cpe:/h:hp:jd373a:-", "cpe:/h:hp:0235a20q:-", "cpe:/h:hp:3crs42g-24-91:-", "cpe:/h:hp:3cr17333a-91:-", "cpe:/h:hp:0235a21x:-", "cpe:/h:hp:0235a25s:-", "cpe:/h:hp:3c13616:-", "cpe:/h:hp:je013a:-", "cpe:/h:hp:0235a15j:-", "cpe:/h:hp:jd242a:-", "cpe:/h:hp:jf431a:-", "cpe:/h:hp:jg225a:-", "cpe:/h:hp:jd242b:-", "cpe:/h:hp:3c13640:-", "cpe:/h:hp:0235a328:-", "cpe:/h:hp:0235a267:-", "cpe:/h:hp:0235a42b:-", "cpe:/h:hp:je088a:-", "cpe:/h:hp:3cr17761taa-91:-", "cpe:/h:hp:3cr17171-91:-", "cpe:/h:hp:0235a15c:-", "cpe:/h:hp:jr430b:-", "cpe:/h:hp:jd335a:-", "cpe:/h:hp:3cs7906e:-", "cpe:/h:hp:je096a:-", "cpe:/h:hp:jd027a:-", "cpe:/h:hp:0235a0e5:-", "cpe:/h:hp:jc612a:-", "cpe:/h:hp:0235a0gc:-", "cpe:/h:hp:3crs48g-24s-91:-", "cpe:/h:hp:0235a0e6:-", "cpe:/h:hp:3cr17341taa-91:-", "cpe:/h:hp:jc496a:-", "cpe:/h:hp:jc652a:-", "cpe:/h:hp:je068a:-", "cpe:/h:hp:0235a15g:-", "cpe:/h:hp:0235a22d:-", "cpe:/h:hp:je199a:-", "cpe:/h:hp:je167a:-", "cpe:/h:huawei:cx600:v200r002", "cpe:/h:hp:3cr17258-91:-", "cpe:/h:hp:jg245a:-", "cpe:/h:hp:jc125a:-", "cpe:/h:hp:jg221a:-", "cpe:/h:hp:0235a15b:-", "cpe:/h:hp:0235a15h:-", "cpe:/h:hp:je006a:-", "cpe:/h:hp:jc691a:-", "cpe:/h:hp:jd028a:-", "cpe:/h:hp:jd251a:-", "cpe:/h:hp:jd302a:-", "cpe:/h:hp:jd660a:-", "cpe:/h:hp:jd220a:-", "cpe:/h:hp:3c17304a:-", "cpe:/h:hp:jd673a:-", "cpe:/h:hp:0235a31d:-", "cpe:/h:hp:je551a:-", "cpe:/h:hp:0235a0g2:-", "cpe:/h:hp:jd917a:-", "cpe:/h:hp:jd355a:-", "cpe:/h:hp:0235a38m:-", "cpe:/h:hp:jd239a:-", "cpe:/h:hp:3cr17172taa-91:-", "cpe:/h:hp:0235a25r:-", "cpe:/h:hp:3cr17572-91:-", "cpe:/h:hp:jf553a:-"], "id": "CVE-2012-3268", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3268", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:h:hp:jd239b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd379a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc700a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a22k:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17331a-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c13840:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a21q:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg182a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a398:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc176a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd023a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crs45g-48-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je101a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf428a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a20v:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je204a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a19l:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf817a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0bt:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg208a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a23h:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc178a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg222a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd243b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0231a86p:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17172taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd347a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a296:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd306a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd972a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd432a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17253-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc104a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a19j:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd346a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd010a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg255a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd344a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg238a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg213a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je200a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf228a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc652a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a20n:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je021a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf234a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je033a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je104a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a29a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je046a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je061a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a20s:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a31n:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je020a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd661a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a22p:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0e5:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:lsq1fwbsc0:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd353a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg252a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd240a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je168a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd923a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc666a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a32e:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd334a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf640a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0e6:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a22f:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je108a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a08f:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a10k:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg304a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg091a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd373a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a20j:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a19c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cs7906e:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg236a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a17b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc613a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:lsr1fw2a1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a31x:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a31r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c13641:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je023a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je025a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je057a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crbvcxmsr05a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a08k:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf845a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a33r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a323:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg350a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd011a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17671-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je066a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0bu:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf804a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd318a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a269:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf802a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je029a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd378a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg305a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je032a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc100a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd674a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf235a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg299a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd666a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd325a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf815a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je102a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0e7:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd335a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je167a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc147a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ne20e-x6:v600r003:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je092a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf807a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a31d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je096a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a268:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd326a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crs48g-24p-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a25n:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf800a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17161-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0231a88a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0g4:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc474a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc698a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf431c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a41d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a31v:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf241a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cruwx500275:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c13640:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd312a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je095a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd672a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17251-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a20p:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0a7:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je067a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a20l:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd251a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a395:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jr024a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0c4:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd009a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd349a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17761-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je062a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je063a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd220a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je058a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a299:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17332a-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a301:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a32x:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a15j:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a298:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a15d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a238:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd675a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je012a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c17541:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crbvcxmsr07a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a393:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0231a0av:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd240b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd310a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17341a-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0150a12b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf237a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc691a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je008a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd376a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd469a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c13636:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a31w:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0g5:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf236a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd028a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0150a12c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je028a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17162taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd348a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:-ma5200g:v300r003:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crbsg2893:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf806a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0g2:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je048a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crs48g-24s-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a267:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0bq:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a22c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:juc653a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je089a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je103a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc055a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd351a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je022a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf239a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a394:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc177a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd303a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:atb:v200r001c00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg247a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je198a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je015a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0gc:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c17543taa:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd332a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a300:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a10j:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17162-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crbsg2093:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd656a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17171-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je166a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c17540taa:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je068a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd029a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd657a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cs7902e:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd275a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg223a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd329a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg183a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf430a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd331a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17172-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a27q:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd027a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg092a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc056a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je107a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc150b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17561-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a10h:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg254a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd665a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17341-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc748a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd172a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf229a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a10c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf551a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf284a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a19h:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crs42g-48-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a38r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf430c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je097a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc105a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a08h:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je110a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crbvcxmsr06a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ne40e\\&80e:v600r003:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg215a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a20k:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17253taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf230a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17171taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd242a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a37t:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg221a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd673a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf846a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg307a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17331-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a322:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf233a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17571-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd307a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a321:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17161taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je069a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg214a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je070a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je073a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17181taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd468a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd356a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je007a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je045a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17250-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd372a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je088a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a15g:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg240a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a29l:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd302a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf247a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd333a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je006a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je099a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a36q:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0as:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf242a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17259-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c13613:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf287a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd245a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg209a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc474b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0ga:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ne5000e:v800r003:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a15b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf286a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd024a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0e3:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je526a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd008a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc125b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf231a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a14v:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg210a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf847a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a42b:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc694a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc177b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:lsq1srpd0:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf803a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg311a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd676a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf809a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd239a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd320a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0231a761:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd249a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd352a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a17a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a20q:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf232a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17250taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0bx:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd668a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17772-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf552a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0g0:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jr431b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c17304a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:rpe-x1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a08m:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17762taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc148b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a29y:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg253a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a10b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd448b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a31b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd357a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a23t:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd241a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a21x:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd355a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd354a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0c0:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf814a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je071a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd663b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0231a88l:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd309a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd337a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je026a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je030a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17254-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17251taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je091a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc697a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17151-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a22h:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd007a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg315a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd338a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je060a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a34b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je064a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd238a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a396:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0g6:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a10d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg184a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crbvcxmsr02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd374a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd658a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17258taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17572-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd918a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd371a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a38q:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a42d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a35j:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc165a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17181-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf553a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a38n:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a23p:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf283a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0g9:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je527a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a31e:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg250a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17771taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a19b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg301a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crbvcxmsr03a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je013a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je005a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg348a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg251a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc149b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a320:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg242a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cs7906ev:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ne40e\\&80e:v600r001:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd305a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd336a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg303a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd431a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a297:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a26g:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd664a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a22r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg059a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c13759:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a10e:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc566a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crs48g-48-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd935a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd194a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je106a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd304a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf431a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c13612:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a38m:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c17302a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a15c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a391:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0bs:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je009a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a32b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc653a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd671a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg248a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg245a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0g1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17662-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd921a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a37u:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf813a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17772taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd328a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17661-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17258-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c13751:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd319a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd375a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf285a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0gf:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd670a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd316a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd450a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd444a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crs45g-24-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0150a129:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17333-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc085a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crs42g-24-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0ct:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd377a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17341taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg249a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg257a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc178b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a31c:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd369a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd659a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd922a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg312a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc496a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd916a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a19d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a22t:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg256a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a39h:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a10f:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crbvcxmsr01a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0231a832:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crs48g-48p-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je072a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c17541taa:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf240a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd314a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je165a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd317a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a328:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a324:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c17543:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd447b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg258a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je018a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd667a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a10g:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd433a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je016a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a237:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg207a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc125a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a20r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a22d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd313a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd268a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf238a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd327a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a326:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf844a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17343a-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crbvcxmsr08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0g3:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a392:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a31q:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0150a12a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a27d:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc086a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd655a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd663a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ne40e\\&80e:v600r002:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17562-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je074a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd313b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd669a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg225a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg246a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a14w:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0a8:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a21p:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd662a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a397:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235aa2m:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd345a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0br:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a32g:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jr430b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd318b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc635a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd917a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd315a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je059a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a19k:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc612a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc101a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd350a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je528a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0c2:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc103a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je100a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc099a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17152-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg478a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a390:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc147b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a327:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je031a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a27s:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a31p:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd449a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd660a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a27r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17762-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf816a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc148a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc149a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd272a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0g8:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crs42g-24p-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17761taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a09t:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c17540:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cs7903es:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc611a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17343-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd238b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0231a65t:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a38p:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je093a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:rtvz33020as:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd654a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a15h:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je203a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a248:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc054a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ne40\\&80:v300r005:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd330a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc124b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd311a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je551a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd319b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc158a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17334-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd447a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crs48g-24-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd320b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf812a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf808a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a37x:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd273a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd241b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd308a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crbsg28pwr93:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je090a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd193a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je199a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd448a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf427a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je105a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je094a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je164a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd250a:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ne40e\\&80e:v300r003:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a0gd:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd946a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd243a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg300a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg239a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17252taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cruwx500475:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crbsg28hpwr93:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17332-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a22e:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd967a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je027a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg349a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a25s:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crbsg5293:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cs7903e:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg237a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd943a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17660-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd026a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a36n:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17331taa-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg241a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je109a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a38v:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jg302a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17771-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd193b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je201a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jf801a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a25r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd242b:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc150a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c13701:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17333a-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:je545a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a10l:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3cr17342-91:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3c13616:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a325:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a16t:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc701a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:0235a15f:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd025a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd370a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jd274a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:jc699a:-:*:*:*:*:*:*:*"]}], "cert": [{"lastseen": "2021-09-28T17:50:48", "description": "### Overview\n\nHP/H3C and Huawei networking equipment contains a vulnerability which could allow an attacker to access administrative functions of the device using systems network management protocol (SNMP) requests.\n\n### Description\n\nAccording to the researcher's [report](<http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html>).:\n\n_\"HP/H3C and Huawei networking equipment suffers from a serious weakness in regards to their handling of Systems Network Management Protocol (SNMP) requests for protected h3c-user.mib and hh3c-user.mib objects._ \n \n_Details \nHuawei/H3C have two OIDs, 'old' and 'new': \n \nold: 1.3.6.1.4.1.2011.10 \nnew: 1.3.6.1.4.1.25506 \n \nMost devices support both formats. \n \nThe MIBs h3c-user.mib and hh3c-user.mib, for the purpose of this document, will be referred to as (h)h3c-user.mib. This MIB defines the internal table and objects to \"Manage configuration and Monitor running state for userlog feature.\" \n \nThis means there are some cool objects with data in this MIB penetration testers or malicious actors would want to get their dirty little hands on. Most objects are only accessible with the read/write community string. \n \nIn the revision history of (h)h3c-user.mib, version 2.0 modified the MAX-ACCESS from read-only to read-create the following objects within the (h)h3cUserInfoEntry sequence: \n \n(h)h3cUserName \n(h)h3cUserPassword \n(h)h3cAuthMode \n(h)h3cUserLevel \n \nThe purpose of these objects are to provide the locally configured users to those with a valid SNMP community. After the change only those with the read-write community string should have access, however this was not the case and the code still retained the earlier access of read-only. \n \nSo if you have the SNMP public community string then you have the ability to view these entries.\"_ \n \nAdditional information can be found in the researcher's [report](<http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html>) \n \n--- \n \n### Impact\n\nA remote unauthenticated attacker can access administrative functions of the device using systems network management protocol (SNMP) requests. \n \n--- \n \n### Solution\n\n**Update** \n \nHP: Customers are advised to check HP's [SSRT100962](<https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03515685&ac.admitted=1350939600802.876444892.492883150>) support document for instructions. \n \nHuawei [Security Advisory](<http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301&contentId=NEWS1000001069&idAbsPath=0301_10001&nameAbsPath=Services%2520News>) states: \"_On Oct. 19, Huawei PSIRT noticed the media report titled \u201cDemo of \"serious\" networking vulnerabilities cancelled at HP's request-Saturday's Toorcon talk was to discuss risks posed by gear from H3C and Huawei\u201d . Huawei PSIRT responded immediately and proactively coordinate Kurt Grutzmacher, US-CERT, CERT/CC and CNCERT to handle the issue. On Oct. 24, Huawei PSIRT finally acquired the technical details of the vulnerabilities from the public channel of US-CERT and launched shortly the vulnerability analysis and investigation to develop the mitigation measures. The first version of \u201cSNMP vulnerability on Huawei multiple products\u201d SA was released on Oct. 25. The investigation is still ongoing. Huawei PSIRT will keep updating the SA. Please refer to the above link._\" \n \n--- \n \nAccording to the researcher's [report](<http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html>): \n \n_\"By itself this is already bad but most users who do any of the following may already be protected: \n \nUse complex SNMP community strings or disable SNMPv1 \nHave disabled the mib entries for (h)h3c-user \nBlock SNMP using access controls or firewalls \nDo not define local users, use RADIUS or TACACS+ \n \nMore specific routines can be found in the vendor's release.\"_ \n \n--- \n \n### Vendor Information\n\n225404\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Additional information available\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n**Javascript is disabled. Click here to view vendors.**\n\n### Hewlett-Packard Company Affected\n\nNotified: August 06, 2012 Updated: October 24, 2012 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * [https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03515685&ac.admitted=1351086123601.876444892.492883150](<https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03515685&ac.admitted=1351086123601.876444892.492883150>)\n\n### Huawei Technologies __ Affected\n\nUpdated: October 26, 2012 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nOn Oct. 19, Huawei PSIRT noticed the media report titled mo of \"serious\" networking vulnerabilities cancelled at HP's request-Saturday's Toorcon talk was to discuss risks posed by gear from H3C and Huawei\u201d . Huawei PSIRT responded immediately and proactively coordinate Kurt Grutzmacher, US-CERT, CERT/CC and CNCERT to handle the issue. On Oct. 24, Huawei PSIRT finally acquired the technical details of the vulnerabilities from the public channel of US-CERT and launched shortly the vulnerability analysis and investigation to develop the mitigation measures. The first version of \u201cSNMP vulnerability on Huawei multiple products\u201d SA was released on Oct. 25. The investigation is still ongoing. Huawei PSIRT will keep updating the SA. Please refer to the above link. \n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * [http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301&contentId=NEWS1000001069&idAbsPath=0301_10001&nameAbsPath=Services%2520News](<http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301&contentId=NEWS1000001069&idAbsPath=0301_10001&nameAbsPath=Services%2520News>)\n\n### 3com Inc Unknown\n\nNotified: August 06, 2012 Updated: August 06, 2012 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n \n\n\n### CVSS Metrics\n\nGroup | Score | Vector \n---|---|--- \nBase | 9.3 | AV:N/AC:M/Au:N/C:C/I:C/A:C \nTemporal | 7.7 | E:F/RL:OF/RC:C \nEnvironmental | 7.7 | CDP:MH/TD:H/CR:ND/IR:ND/AR:ND \n \n \n\n\n### References\n\n * <http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html>\n * [https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03515685&ac.admitted=1351086123601.876444892.492883150](<https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03515685&ac.admitted=1351086123601.876444892.492883150>)\n * [http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301&contentId=NEWS1000001069&idAbsPath=0301_10001&nameAbsPath=Services%2520News](<http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301&contentId=NEWS1000001069&idAbsPath=0301_10001&nameAbsPath=Services%2520News>)\n\n### Acknowledgements\n\nThanks to Kurt Grutzmacher for reporting this vulnerability.\n\nThis document was written by Michael Orlando.\n\n### Other Information\n\n**CVE IDs:** | [CVE-2012-3268](<http://web.nvd.nist.gov/vuln/detail/CVE-2012-3268>) \n---|--- \n**Date Public:** | 2012-10-23 \n**Date First Published:** | 2012-10-24 \n**Date Last Updated: ** | 2012-10-26 12:39 UTC \n**Document Revision: ** | 16 \n", "cvss3": {}, "published": "2012-10-24T00:00:00", "type": "cert", "title": "HP/H3C and Huawei networking equipment h3c-user snmp vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-3268"], "modified": "2012-10-26T12:39:00", "id": "VU:225404", "href": "https://www.kb.cert.org/vuls/id/225404", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}]}