René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

212 lines
6.8 KiB
JSON

{
"id": "CVE-2017-17174",
"sourceIdentifier": "psirt@huawei.com",
"published": "2018-07-31T14:29:00.247",
"lastModified": "2018-10-12T13:37:08.603",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Some Huawei products RSE6500 V500R002C00; SoftCo V200R003C20SPCb00; VP9660 V600R006C10; eSpace U1981 V100R001C20; V200R003C20; V200R003C30; V200R003C50 have a weak algorithm vulnerability. To exploit the vulnerability, a remote, unauthenticated attacker has to capture TLS traffic between clients and the affected products. The attacker may launch the Bleichenbacher attack on RSA key exchange to decrypt the session key and the previously captured sessions by some cryptanalytic operations. Successful exploit may cause information leak."
},
{
"lang": "es",
"value": "Algunos productos Huawei RSE6500 V500R002C00; SoftCo V200R003C20SPCb00; VP9660 V600R006C10; eSpace U1981 V100R001C20; V200R003C20; V200R003C30 y V200R003C50 tienen una vulnerabilidad de algoritmo d\u00e9bil. Para explotar esta vulnerabilidad, un atacante no autenticado remoto debe capturar tr\u00e1fico TLS entre los clientes y los productos afectados. El atacante podr\u00eda iniciar un ataque Bleichenbacher en el intercambio de claves RSA para descifrar la clave de sesi\u00f3n y las sesiones previamente capturadas por medio de operaciones de criptoan\u00e1lisis. Un exploit con \u00e9xito podr\u00eda provocar un filtrado de informaci\u00f3n."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-310"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
"matchCriteriaId": "649BB696-BDBE-46FC-A23D-287DE306D8BB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD9417D-0515-4B21-AD32-E6B137575D01"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:softco_firmware:v200r003c20spcb00:*:*:*:*:*:*:*",
"matchCriteriaId": "8CCA190A-D381-4139-B2A6-28B19A534C75"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0BB461-988A-4E55-BEFC-C5BB8245E751"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:vp9660_firmware:v600r006c10:*:*:*:*:*:*:*",
"matchCriteriaId": "8D888F94-B0D9-4CFF-8A29-7F1720B5BEDA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1DC498B-F19F-403A-ACFE-F8364A78EC66"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r001c20:*:*:*:*:*:*:*",
"matchCriteriaId": "CDC5311E-194E-4891-B762-8FC1EAA27E72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
"matchCriteriaId": "C82BCBDF-4F07-47F1-BB91-6148E2403133"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
"matchCriteriaId": "FC865317-D874-469D-AE84-7700B0F1485C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c50:*:*:*:*:*:*:*",
"matchCriteriaId": "21E676EE-B0B5-4177-8676-2936DE259C39"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F"
}
]
}
]
}
],
"references": [
{
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180703-01-algorithm-en",
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}