Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.107848 |
Category: | Huawei |
Title: | Huawei Data Communication: Weak Algorithm Vulnerability in Some Huawei Products (huawei-sa-20180703-01-algorithm) |
Summary: | There is a weak algorithm vulnerability in some Huawei products. |
Description: | Summary: There is a weak algorithm vulnerability in some Huawei products. Vulnerability Insight: There is a weak algorithm vulnerability in some Huawei products. To exploit the vulnerability, a remote, unauthenticated attacker has to capture traffic between clients and the affected products. The attacker may launch the Bleichenbacher attack on RSA key exchange and decrypt the session key by some cryptanalytic operations and the previously captured TLS sessions. Successful exploit may cause information leak. (Vulnerability ID: HWPSIRT-2017-12135)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-17174.Huawei has released software updates to fix this vulnerability. This advisory is available in the linked references. Vulnerability Impact: Successful exploit may cause information leak. Affected Software/OS: CloudEngine 12800 versions V100R003C00SPC600 V100R003C10SPC100 V100R005C00SPC300 V100R005C10SPC200 V100R006C00SPC600 V200R001C00SPC700 V200R002C50SPC800 CloudEngine 5800 versions V100R003C00SPC600 V100R003C10SPC100 V100R005C00SPC300 V100R005C10SPC200 V100R006C00SPC600 V200R001C00SPC700 V200R002C50SPC800 CloudEngine 6800 versions V100R003C00SPC600 V100R003C10SPC100 V100R005C00SPC300 V100R005C10SPC200 V100R006C00SPC600 V200R001C00SPC600 V200R002C50SPC800 CloudEngine 7800 versions V100R003C00SPC600 V100R003C10SPC100 V100R005C00SPC300 V100R005C10SPC200 V100R006C00SPC600 V200R001C00SPC600 V200R002C50SPC800 RSE6500 versions V500R002C00 S12700 versions V200R007C00 V200R007C01 V200R008C00 V200R009C00 V200R010C00 S1700 versions V200R006C10SPC100 V200R009C00SPC200 V200R010C00 S2700 versions V200R006C00SPC100 V200R006C10 V200R007C00 V200R008C00 V200R009C00 V200R010C00 S5700 versions V200R005C02B010 V200R005C03B020 V200R006C00SPC100 V200R007C00 V200R008C00 V200R009C00 V200R010C00 S6700 versions V200R005C02B020 V200R008C00 V200R009C00 S7700 versions V200R006C00SPC300 V200R007C00 V200R008C00 V200R009C00SPC500 V200R010C00 S9700 versions V200R006C00SPC100 V200R007C00 V200R007C01B102 V200R008C00SPC500 V200R009C00 V200R010C00 SoftCo versions V200R003C20SPCb00 VP9660 versions V600R006C10 eSpace U1981 versions V100R001C20SPC700 V200R003C20SPCb00 V200R003C30SPC500 V200R003C50 Solution: See the referenced vendor advisory for a solution. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-17174 |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |