2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-22342" ,
"sourceIdentifier" : "psirt@huawei.com" ,
"published" : "2021-06-22T19:15:07.880" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T05:49:56.753" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "There is an information leak vulnerability in Huawei products. A module does not deal with specific input sufficiently. High privilege attackers can exploit this vulnerability by performing some operations. This can lead to information leak. Affected product versions include: IPS Module versions V500R005C00, V500R005C10, V500R005C20; NGFW Module versions V500R005C00,V500R005C10, V500R005C20; SeMG9811 versions V500R005C00; USG9500 versions V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20."
} ,
{
"lang" : "es" ,
"value" : "Se presenta una vulnerabilidad de filtrado de informaci\u00f3n en los productos de Huawei. Un m\u00f3dulo no trata suficientemente la entrada espec\u00edfica. Los atacantes con altos privilegios pueden explotar esta vulnerabilidad llevando a cabo algunas operaciones. Esto puede conllevar a un filtrado de informaci\u00f3n. Las versiones de producto afectadas incluyen: M\u00f3dulo IPS versiones V500R005C00, V500R005C10, V500R005C20; M\u00f3dulo NGFW versiones V500R005C00,V500R005C10, V500R005C20; SeMG9811 versiones V500R005C00; USG9500 versiones V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 4.9 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 4.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "60A9007D-D6AD-4DB9-A0AC-1E400AEC0884"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:ips_module_firmware:v500r005c10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "675FA47C-BF23-4B1B-B8F5-CE7C7585ACB5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:ips_module_firmware:v500r005c20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A91B37BC-F4FD-499A-918E-6396251A0F5F"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D57DC59-B234-463F-8BBD-631B7EE9928C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "22251FD6-AF00-4A49-BAA1-282601530155"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BD519058-E753-440C-A954-931D8E6BA1CF"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:semg9811_firmware:v500r005c00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "45E9ED50-031B-48F9-AD89-8596D8A6B551"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "219AF4A5-4134-4265-BF69-C340665714F1"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "22007E6A-68FC-4AF4-A570-95873AFBF882"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "11D1A4CC-2F7E-40AF-8874-EE3986176623"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C329182-E16A-4E89-A43C-0DB90BDE4AA5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:usg9500_firmware:v500r001c80:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "745CD04C-C989-439A-9145-D1BF5CE0E3F8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E961C6AA-400A-41CF-A230-FE7182875F1F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:usg9500_firmware:v500r005c10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5A32EF67-5C9D-4F2F-BCC9-D5C5C9F69544"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "31F8A14F-8956-493C-8062-EAB872AD0420"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4B6064BB-5E62-4D70-B933-05B5426EEE9C"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en" ,
"source" : "psirt@huawei.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}