Lucene search

K
huaweiHuawei TechnologiesHUAWEI-SA-20180530-02-SERVER
HistoryMay 30, 2018 - 12:00 a.m.

Security Advisory - Two JSON Injection Vulnerabilities in Some Huawei Servers

2018-05-3000:00:00
Huawei Technologies
www.huawei.com
22

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

53.5%

The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have two JSON injection vulnerabilities due to insufficient input validation. An authenticated, remote attacker can launch a JSON injection to modify the password of administrator. Successful exploit may allow attackers to obtain the management privilege of the system. (Vulnerability ID: HWPSIRT-2018-02050 and HWPSIRT-2018-02051)
The two vulnerabilities have been assigned two Common Vulnerabilities and Exposures (CVE) IDs: CVE-2018-7950 and CVE-2018-7951.
Huawei has released software updates to fix these vulnerabilities. This advisory is available at the following link:
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180530-02-server-en

Affected configurations

Vulners
Node
huawei1288h_v5_firmwareMatchv100r005c00
OR
huawei2288h_v5_firmwareMatchv100r005c00
OR
huawei2488_v5_firmwareMatchv100r005c00
OR
huaweich121_v3_firmwareMatchv100r001c00
OR
huaweich121l_v3_firmwareMatchv100r001c00
OR
huaweich121l_v5_firmwareMatchv100r001c00
OR
huaweich121_v5_firmwareMatchv100r001c00
OR
huaweich140_v3_firmwareMatchv100r001c00
OR
huaweich140l_v3_firmwareMatchv100r001c00
OR
huaweich220_v3_firmwareMatchv100r001c00
OR
huaweich222_v3_firmwareMatchv100r001c00
OR
huaweich242_v3_firmwareMatchv100r001c00
OR
huaweich242_v5_firmwareMatchv100r001c00
OR
huaweirh1288_v3_firmwareMatchv100r003c00
OR
huaweirh2288_v3_firmwareMatchv100r003c00
OR
huaweirh2288h_v3_firmwareMatchv100r003c00
OR
huaweixh310_v3_firmwareMatchv100r003c00
OR
huaweixh321_v3_firmwareMatchv100r003c00
OR
huaweixh321_v5_firmwareMatchv100r005c00
OR
huaweixh620_v3_firmwareMatchv100r003c00
VendorProductVersionCPE
huawei1288h_v5_firmwarev100r005c00cpe:2.3:o:huawei:1288h_v5_firmware:v100r005c00:*:*:*:*:*:*:*
huawei2288h_v5_firmwarev100r005c00cpe:2.3:o:huawei:2288h_v5_firmware:v100r005c00:*:*:*:*:*:*:*
huawei2488_v5_firmwarev100r005c00cpe:2.3:o:huawei:2488_v5_firmware:v100r005c00:*:*:*:*:*:*:*
huaweich121_v3_firmwarev100r001c00cpe:2.3:o:huawei:ch121_v3_firmware:v100r001c00:*:*:*:*:*:*:*
huaweich121l_v3_firmwarev100r001c00cpe:2.3:o:huawei:ch121l_v3_firmware:v100r001c00:*:*:*:*:*:*:*
huaweich121l_v5_firmwarev100r001c00cpe:2.3:o:huawei:ch121l_v5_firmware:v100r001c00:*:*:*:*:*:*:*
huaweich121_v5_firmwarev100r001c00cpe:2.3:o:huawei:ch121_v5_firmware:v100r001c00:*:*:*:*:*:*:*
huaweich140_v3_firmwarev100r001c00cpe:2.3:o:huawei:ch140_v3_firmware:v100r001c00:*:*:*:*:*:*:*
huaweich140l_v3_firmwarev100r001c00cpe:2.3:o:huawei:ch140l_v3_firmware:v100r001c00:*:*:*:*:*:*:*
huaweich220_v3_firmwarev100r001c00cpe:2.3:o:huawei:ch220_v3_firmware:v100r001c00:*:*:*:*:*:*:*
Rows per page:
1-10 of 201

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

53.5%

Related for HUAWEI-SA-20180530-02-SERVER