CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
46.2%
Huawei DP300 V500R002C00; RP200 V500R002C00; V600R006C00; TE30 V100R001C10; V600R006C00; TE50 V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00; VP9660 V500R002C10 have an DoS vulnerability due to insufficient validation of the parameter when a putty comment key is loaded. An authenticated remote attacker can place a malformed putty key file in system when a system manager load the key an infinite loop happens which lead to reboot the system.
Vendor | Product | Version | CPE |
---|---|---|---|
huawei | dp300_firmware | v500r002c00 | cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:* |
huawei | dp300 | - | cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:* |
huawei | rp200_firmware | v500r002c00 | cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:* |
huawei | rp200_firmware | v600r006c00 | cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:* |
huawei | rp200 | - | cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:* |
huawei | te30_firmware | v100r001c10 | cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:* |
huawei | te30_firmware | v600r006c00 | cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:* |
huawei | te30 | - | cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:* |
huawei | te50_firmware | v600r006c00 | cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:* |
huawei | te50 | - | cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:* |
[
{
"product": "DP300; RP200; TE30; TE50; TE60; VP9660",
"vendor": "Huawei Technologies Co., Ltd.",
"versions": [
{
"status": "affected",
"version": "DP300 V500R002C00"
},
{
"status": "affected",
"version": "RP200 V500R002C00"
},
{
"status": "affected",
"version": "V600R006C00"
},
{
"status": "affected",
"version": "TE30 V100R001C10"
},
{
"status": "affected",
"version": "TE50 V600R006C00"
},
{
"status": "affected",
"version": "TE60 V100R001C10"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "VP9660 V500R002C10"
}
]
}
]
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
46.2%