Lucene search

K
cve[email protected]CVE-2018-7949
HistoryJun 01, 2018 - 2:29 p.m.

CVE-2018-7949

2018-06-0114:29:00
CWE-287
web.nvd.nist.gov
22
ibmc
huawei
servers
privilege escalation
authentication
vulnerability
cve-2018-7949
nvd

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

66.4%

The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a privilege escalation vulnerability. A remote attacker may send some specially crafted login messages to the affected products. Due to improper authentication design, successful exploit enables low privileged users to get or modify passwords of highly privileged users.

Affected configurations

NVD
Node
huawei1288h_v5_firmwareMatch100r005c00
AND
huawei1288h_v5Match-
Node
huawei2288h_v5_firmwareMatch100r005c00
AND
huawei2288h_v5Match-
Node
huawei2488_v5_firmwareMatch100r005c00
AND
huawei2488_v5Match-
Node
huaweich121_v3_firmwareMatch100r001c00
AND
huaweich121_v3Match-
Node
huaweich121l_v3_firmwareMatch100r001c00
AND
huaweich121l_v3Match-
Node
huaweich121l_v5_firmwareMatch100r001c00
AND
huaweich121l_v5Match-
Node
huaweich121_v5_firmwareMatch100r001c00
AND
huaweich121_v5Match-
Node
huaweich140_v3_firmwareMatch100r001c00
AND
huaweich140_v3Match-
Node
huaweich140l_v3_firmwareMatch100r001c00
AND
huaweich140l_v3Match-
Node
huaweich220_v3_firmwareMatch100r001c00
AND
huaweich220_v3Match-
Node
huaweich222_v3_firmwareMatch100r001c00
AND
huaweich222_v3Match-
Node
huaweich242_v3_firmwareMatch100r001c00
AND
huaweich242_v3Match-
Node
huaweich242_v5_firmwareMatch100r001c00
AND
huaweich242_v5Match-
Node
huaweirh1288_v3_firmwareMatch100r003c00
AND
huaweirh1288_v3Match-
Node
huaweirh2288_v3_firmwareMatch100r003c00
AND
huaweirh2288_v3Match-
Node
huaweixh310_v3_firmwareMatch100r003c00
AND
huaweixh310_v3Match-
Node
huaweixh321_v3_firmwareMatch100r003c00
AND
huaweixh321_v3Match-
Node
huaweixh321_v5_firmwareMatch100r005c00
AND
huaweixh321_v5Match-
Node
huaweirh2288h_v3_firmwareMatch100r003c00
AND
huaweirh2288h_v3Match-
Node
huaweixh620_v3_firmwareMatch100r003c00
AND
huaweixh620_v3Match-

CNA Affected

[
  {
    "product": "1288H V5; 2288H V5; 2488 V5 ; CH121 V3; CH121L V3; CH121L V5 ; CH121 V5 ; CH140 V3; CH140L V3; CH220 V3; CH222 V3; CH242 V3; CH242 V5 ; RH1288 V3; RH2288 V3; RH2288H V3; XH310 V3; XH321 V3; XH321 V5; XH620 V3",
    "vendor": "Huawei Technologies Co., Ltd.",
    "versions": [
      {
        "status": "affected",
        "version": "1288H V5 V100R005C00"
      },
      {
        "status": "affected",
        "version": "2288H V5 V100R005C00"
      },
      {
        "status": "affected",
        "version": "2488 V5 V100R005C00"
      },
      {
        "status": "affected",
        "version": "CH121 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH121L V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH121L V5 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH121 V5 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH140 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH140L V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH220 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH222 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH242 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH242 V5 V100R001C00"
      },
      {
        "status": "affected",
        "version": "RH1288 V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "RH2288 V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "RH2288H V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "XH310 V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "XH321 V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "XH321 V5 V100R005C00"
      },
      {
        "status": "affected",
        "version": "XH620 V3 V100R003C00"
      }
    ]
  }
]

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

66.4%

Related for CVE-2018-7949