![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.143988 |
Kategorie: | Huawei |
Titel: | Huawei Data Communication: Insufficient Input Validation Vulnerability in Some Huawei Products (huawei-sa-20171215-01-ike) |
Zusammenfassung: | There is an insufficient input validation vulnerability in some Huawei products. |
Beschreibung: | Summary: There is an insufficient input validation vulnerability in some Huawei products. Vulnerability Insight: There is an insufficient input validation vulnerability in some Huawei products. An unauthenticated, remote attacker may send crafted IKE V2 messages to the affected products. Due to the insufficient validation of the messages, successful exploit will cause invalid memory access and result in a denial of service on the affected products. (Vulnerability ID: HWPSIRT-2017-02002)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-17299.Huawei has released software updates to fix this vulnerability. This advisory is available in the linked references. Vulnerability Impact: Successful exploit will cause invalid memory access and result in a denial of service on the affected products. Affected Software/OS: AR120-S versions V200R006C10SPC300 V200R007C00SPC900 AR1200 versions V200R006C10SPC300 V200R006C13 V200R007C00SPC900 V200R007C02 AR1200-S versions V200R006C10SPC300 V200R007C00SPC900 V200R008C20SPC800PWE AR150 versions V200R006C10SPC300 V200R007C00SPC900 V200R007C02 AR150-S versions V200R006C10SPC300 V200R007C00SPC900 AR160 versions V200R006C10SPC300 V200R006C12 V200R007C00SPC900 V200R007C02 AR200 versions V200R006C10SPC300 V200R007C00SPC900 AR200-S versions V200R006C10SPC300 V200R007C00SPC900 AR2200 versions V200R006C10SPC300 V200R006C13 V200R006C16PWE V200R007C00SPC900 V200R007C02 AR2200-S versions V200R006C10SPC300 V200R007C00SPC900 V200R008C20SPC800PWE AR3200 versions V200R006C10SPC200 V200R006C11 V200R007C00 V200R007C02 AR3600 versions V200R006C10SPC300 V200R007C00SPC900 AR510 versions V200R006C12 V200R006C13 V200R006C15 V200R006C16 V200R006C17 V200R007C00SPC900 DBS3900 TDD LTE versions V100R003C00 V100R004C10 IPS Module versions V500R001C30SPC100PWE NGFW Module versions V500R002C00SPC100PWE NIP6300 versions V500R001C30SPC100PWE NIP6600 versions V500R001C30SPC100PWE NetEngine16EX versions V200R006C10SPC300 V200R007C00SPC900 SRG1300 versions V200R006C10SPC300 V200R007C00SPC900 V200R007C02 SRG2300 versions V200R006C10SPC300 V200R007C00SPC900 V200R007C02 SRG3300 versions V200R006C10SPC300 V200R007C00SPC900 Secospace USG6300 versions V500R001C30SPC100PWE Secospace USG6500 versions V500R001C30SPC200PWE Secospace USG6600 versions V500R001C30SPC100PWE USG9500 versions V500R001C30SPC100PWE Solution: See the referenced vendor advisory for a solution. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-17299 |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |