mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
144 lines
4.6 KiB
JSON
144 lines
4.6 KiB
JSON
{
|
|
"id": "CVE-2015-8087",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2015-11-19T20:59:11.960",
|
|
"lastModified": "2015-11-20T15:10:22.843",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Huawei NE20E-S, NE40E-M, and NE40E-M2 routers with software before V800R007C10SPC100 and NE40E and NE80E routers with software before V800R007C00SPC100 allows remote attackers to send packets to other VPNs and conduct flooding attacks via a crafted MPLS forwarding packet, aka a \"VPN routing and forwarding (VRF) hopping vulnerability.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Routers Huawei NE20E-S, NE40E-M y NE40E-M2 con software en versiones anteriores a V800R007C10SPC100 y routers NE40E y NE80E con software en versiones anteriores a V800R007C00SPC100 permite a atacantes remotos enviar paquetes a otras VPNs y realizar ataques de inundaci\u00f3n a trav\u00e9s del reenv\u00edo de un paquete MPLS manipulado, tambi\u00e9n conocido como 'VPN routing y forwarding (VRF) hopping vulnerability.'"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:huawei:ne_router_software:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "v800r006",
|
|
"matchCriteriaId": "85E31531-A395-4A57-9C6C-728F20E7B980"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:huawei:ne_router_software:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "v800r007c00",
|
|
"matchCriteriaId": "98433F99-0D69-48F4-A9F1-E0286117DB6E"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:huawei:ne20e-s:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A01D2B0-26DD-4B96-A81B-19C6C7648174"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:huawei:ne40e-m:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7CF3CC04-C10F-40D0-8EBD-5FD6AB82EA30"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:huawei:ne40e-m2:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "28D6CB5E-2D19-46E0-AD6C-ECE67F8CC54F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:huawei:ne_router_software:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "v800r006",
|
|
"matchCriteriaId": "85E31531-A395-4A57-9C6C-728F20E7B980"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:huawei:ne40e:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC8305DE-35FC-4F3C-96E1-FB083D26FCB5"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:huawei:ne80e:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0113DDEA-5205-4E4B-B74B-04918FD00D8E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-457933.htm",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |