![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.150307 |
Kategorie: | Huawei |
Titel: | Denial of Service Vulnerability in Some Huawei Products (huawei-sa-20200527-01-dos) |
Zusammenfassung: | There is a denial of service vulnerability in some Huawei products. |
Beschreibung: | Summary: There is a denial of service vulnerability in some Huawei products. Vulnerability Insight: There is a denial of service vulnerability in some Huawei products. Due to improper memory management, memory leakage may occur in some special cases. Attackers can perform a series of operations to exploit this vulnerability. Successful exploit may cause a denial of service. Huawei has released software updates to fix this vulnerability. This advisory is available in the linked references. Vulnerability Impact: Successful exploit may cause a denial of service. Affected Software/OS: CloudEngine 12800 versions V200R019C00SPC800 CloudEngine 16800 versions V200R005C20SPC800 CloudEngine 5800 versions V200R019C00SPC800 CloudEngine 6800 versions V200R005C20SPC800 V200R019C00SPC800 CloudEngine 7800 versions V200R019C00SPC800 CloudEngine 8800 versions V200R019C00SPC800 Solution: See the referenced vendor advisory for a solution. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-1870 https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-dos-en |
Copyright | Copyright (C) 2020 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |