mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
102 lines
3.9 KiB
JSON
102 lines
3.9 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2020-1843",
|
|
"ASSIGNER": "psirt@huawei.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Huawei",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "HEGE-560",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "1.0.1.20(SP2)"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "OSCA-550",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "1.0.0.71(SP1)"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "OSCA-550A",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "1.0.0.71(SP1)"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "OSCA-550AX",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "1.0.0.71(SP2)"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "OSCA-550X",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "1.0.0.71(SP2)"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Insufficient Authentication"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-02-osca-en",
|
|
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-02-osca-en"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Huawei HEGE-560 version 1.0.1.20(SP2), OSCA-550 version 1.0.0.71(SP1), OSCA-550A version 1.0.0.71(SP1), OSCA-550AX version 1.0.0.71(SP2), and OSCA-550X version 1.0.0.71(SP2) have an insufficient verification vulnerability. An attacker can perform specific operations to exploit this vulnerability by physical access methods. Successful exploitation may cause the attacker perform an illegal operation."
|
|
}
|
|
]
|
|
}
|
|
} |