mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
213 lines
8.3 KiB
JSON
213 lines
8.3 KiB
JSON
{
|
|
"id": "CVE-2021-37127",
|
|
"sourceIdentifier": "psirt@huawei.com",
|
|
"published": "2021-10-27T01:15:07.710",
|
|
"lastModified": "2021-10-28T17:01:14.343",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "There is a signature management vulnerability in some huawei products. An attacker can forge signature and bypass the signature check. During firmware update process, successful exploit this vulnerability can cause the forged system file overwrite the correct system file. Affected product versions include:iManager NetEco V600R010C00CP2001,V600R010C00CP2002,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300;iManager NetEco 6000 V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se presenta una vulnerabilidad en la administraci\u00f3n de firmas en algunos productos de Huawei. Un atacante puede falsificar la firma y omitir la comprobaci\u00f3n de la misma. Durante el proceso de actualizaci\u00f3n del firmware, una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad puede causar que el archivo de sistema forjado sobrescriba el archivo de sistema correcto. Las versiones de producto afectadas incluyen: iManager NetEco V600R010C00CP2001,V600R010C00CP2002,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300; iManager NetEco 6000 V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.2,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-347"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00cp2001:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57B9F1D8-043C-4F35-B82E-1B058A0E3E06"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00cp2002:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5179F24D-E60C-4E2B-A7B7-E449B1A23EB8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc100:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "497DA2B2-A223-4DF4-8318-4D61A07DE89E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc110:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F6EABC8D-CF29-4EE8-AB12-52FD319E0451"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc120:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4868DB43-AAC0-4709-A624-5DEC440DC467"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc200:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2CF23C0E-13A5-4048-BEF5-327914421B9E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc210:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8F4DC23A-5740-49FA-9357-31FD557A0CF6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc300:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "18F19C7B-95A2-4E09-ABC0-0CFA84C0085E"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:huawei:imanager_neteco_6000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B8CFC69-D6E8-4163-AE0F-B85693F2555D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc100:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "485BDF37-6661-4BE6-9E8F-81789438BE9E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc110:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E57422AB-3A4A-4607-BD5F-F2202DC98DBC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc120:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A81E5DA2-A22D-4709-A6A1-BF1E9E4FE90F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc190:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E6BEE4A-AFD0-4618-8A0C-98FB34578924"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc200:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4AEDC6F2-9B47-4CD7-922F-F1E44E70D3FF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc201:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "369D1CB7-F518-4FDA-8B91-5175AEBF8A27"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc202:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC7E8838-96CF-4ACF-A40A-11C89D2D3289"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc210:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7BC54B6E-69E3-4DDD-B2C3-22159285DE83"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:huawei:imanager_neteco:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D96479E8-2B4F-4149-B61B-79ECD0524A01"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-signature-en",
|
|
"source": "psirt@huawei.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |