CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
EPSS
Percentile
46.2%
There is an DoS vulnerability in some Huawei products due to insufficient validation of the parameter when a putty comment key is loaded. An authenticated remote attacker can place a malformed putty key file in system, when a system manager load the key, an infinite loop happens which lead to reboot the system. (Vulnerability ID: HWPSIRT-2017-06039)
This vulnerability has been assigned a CVE ID: CVE-2017-17131.
Huawei has released software updates to fix this vulnerability. This advisory is available at the following link:
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-vpp-en
Vendor | Product | Version | CPE |
---|---|---|---|
huawei | dp300_firmware | v500r002c00 | cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:* |
huawei | rp200_firmware | v500r002c00 | cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:* |
huawei | rp200_firmware | v600r006c00 | cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:* |
huawei | te30_firmware | v100r001c10 | cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:* |
huawei | te30_firmware | v600r006c00 | cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:* |
huawei | te50_firmware | v600r006c00 | cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:* |
huawei | te60_firmware | v100r001c10 | cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:* |
huawei | te60_firmware | v500r002c00 | cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:* |
huawei | te60_firmware | v600r006c00 | cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:* |
huawei | vp9660_firmware | v500r002c10 | cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
EPSS
Percentile
46.2%