René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

136 lines
4.4 KiB
JSON

{
"id": "CVE-2020-9212",
"sourceIdentifier": "psirt@huawei.com",
"published": "2021-03-22T18:15:14.293",
"lastModified": "2021-03-26T18:45:32.957",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak."
},
{
"lang": "es",
"value": "Se presenta una vulnerabilidad en alguna versi\u00f3n de USG9500 de que el dispositivo maneja inapropiadamente la informaci\u00f3n cuando un usuario inicia sesi\u00f3n en el dispositivo. El atacante puede explotar la vulnerabilidad para llevar a cabo alguna operaci\u00f3n y puede conseguir informaci\u00f3n y causar un filtrado de informaci\u00f3n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "BE7369E3-5F3F-40D1-8690-95192131B683"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA71C5D-4B11-401D-AEC9-907204C21476"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20spc300:*:*:*:*:*:*:*",
"matchCriteriaId": "BF50C46B-73B1-4702-B9A5-8690DE89F81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20spc500:*:*:*:*:*:*:*",
"matchCriteriaId": "4106345E-7FC8-4B6A-8BD4-A09340411BDD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "6C5AE3B9-1AE9-4DA6-8A62-720EF3B40B4D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B6064BB-5E62-4D70-B933-05B5426EEE9C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en",
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}