2024-12-08 03:06:42 +00:00

232 lines
6.8 KiB
JSON

{
"id": "CVE-2020-1843",
"sourceIdentifier": "psirt@huawei.com",
"published": "2020-02-18T03:15:11.217",
"lastModified": "2024-11-21T05:11:28.697",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Huawei HEGE-560 version 1.0.1.20(SP2), OSCA-550 version 1.0.0.71(SP1), OSCA-550A version 1.0.0.71(SP1), OSCA-550AX version 1.0.0.71(SP2), and OSCA-550X version 1.0.0.71(SP2) have an insufficient verification vulnerability. An attacker can perform specific operations to exploit this vulnerability by physical access methods. Successful exploitation may cause the attacker perform an illegal operation."
},
{
"lang": "es",
"value": "Huawei HEGE-560 versi\u00f3n 1.0.1.20(SP2), OSCA-550 versi\u00f3n 1.0.0.71(SP1), OSCA-550A versi\u00f3n 1.0.0.71(SP1), OSCA-550AX versi\u00f3n 1.0.0.71(SP2) y versi\u00f3n OSCA-550X 1.0.0.71(SP2), presentan una vulnerabilidad de comprobaci\u00f3n insuficiente. Un atacante puede llevar a cabo operaciones espec\u00edficas para explotar esta vulnerabilidad mediante m\u00e9todos de acceso f\u00edsico. Una explotaci\u00f3n con \u00e9xito puede causar que el atacante realice una operaci\u00f3n ilegal."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 4.6,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:hege-560_firmware:1.0.1.20\\(sp2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "65CC8631-B76A-4EBC-AA9C-D53FB1D256CE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:hege-560:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3325D5D9-8956-4335-B616-C553BF885152"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:osca-550_firmware:1.0.0.71\\(sp1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8FBE7C39-A376-4C6C-A8BB-A27AFC54770B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:osca-550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D0122F-89FF-4B3E-8837-2E07A0D27105"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:osca-550a_firmware:1.0.0.71\\(sp1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "665F1A21-5F7A-49CD-9051-53BCB06993B7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:osca-550a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D4E574D-DEFF-48CC-81F0-28DB6432EF13"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:osca-550ax_firmware:1.0.0.71\\(sp2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8ADA1B36-992F-44A5-A5AE-FD9AC7772D0A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:osca-550ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62EEE25C-2FA4-4B64-9680-387380D97352"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:osca-550x_firmware:1.0.0.71\\(sp2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91C579FB-2CBB-4836-A7A6-C06131B2DB15"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:osca-550x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "565AF527-86EF-4314-A645-B99D0C4C62C2"
}
]
}
]
}
],
"references": [
{
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-02-osca-en",
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-02-osca-en",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}