CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
46.3%
Huawei DP300 V500R002C00; V500R002C00B010; V500R002C00B011; V500R002C00B012; V500R002C00B013; V500R002C00B014; V500R002C00B017; V500R002C00B018; V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC400; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC800; V500R002C00SPC900; V500R002C00SPCa00; RP200 V500R002C00SPC200; V600R006C00; V600R006C00SPC200; V600R006C00SPC300; TE30 V100R001C10SPC300; V100R001C10SPC500; V100R001C10SPC600; V100R001C10SPC700B010; V500R002C00SPC200; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC900; V500R002C00SPCb00; V600R006C00; V600R006C00SPC200; V600R006C00SPC300; TE40 V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC900; V500R002C00SPCb00; V600R006C00; V600R006C00SPC200; V600R006C00SPC300; TE50 V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPCb00; V600R006C00; V600R006C00SPC200; V600R006C00SPC300; TE60 V100R001C10; V100R001C10B001; V100R001C10B002; V100R001C10B010; V100R001C10B011; V100R001C10B012; V100R001C10B013; V100R001C10B014; V100R001C10B016; V100R001C10B017; V100R001C10B018; V100R001C10B019; V100R001C10SPC400; V100R001C10SPC500; V100R001C10SPC600; V100R001C10SPC700; V100R001C10SPC800B011; V100R001C10SPC900; V500R002C00; V500R002C00B010; V500R002C00B011; V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC800; V500R002C00SPC900; V500R002C00SPCa00; V500R002C00SPCb00; V500R002C00SPCd00; V500R002C00SPCe00; V600R006C00; V600R006C00SPC100; V600R006C00SPC200; V600R006C00SPC300 use the CIDAM protocol, which contains sensitive information in the message when it is implemented. So these products has an information disclosure vulnerability. An authenticated remote attacker could track and get the message of a target system. Successful exploit could allow the attacker to get the information and cause the sensitive information disclosure.
Vendor | Product | Version | CPE |
---|---|---|---|
huawei | dp300_firmware | v500r002c00 | cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:* |
huawei | dp300_firmware | v500r002c00b010 | cpe:2.3:o:huawei:dp300_firmware:v500r002c00b010:*:*:*:*:*:*:* |
huawei | dp300_firmware | v500r002c00b011 | cpe:2.3:o:huawei:dp300_firmware:v500r002c00b011:*:*:*:*:*:*:* |
huawei | dp300_firmware | v500r002c00b012 | cpe:2.3:o:huawei:dp300_firmware:v500r002c00b012:*:*:*:*:*:*:* |
huawei | dp300_firmware | v500r002c00b013 | cpe:2.3:o:huawei:dp300_firmware:v500r002c00b013:*:*:*:*:*:*:* |
huawei | dp300_firmware | v500r002c00b014 | cpe:2.3:o:huawei:dp300_firmware:v500r002c00b014:*:*:*:*:*:*:* |
huawei | dp300_firmware | v500r002c00b017 | cpe:2.3:o:huawei:dp300_firmware:v500r002c00b017:*:*:*:*:*:*:* |
huawei | dp300_firmware | v500r002c00b018 | cpe:2.3:o:huawei:dp300_firmware:v500r002c00b018:*:*:*:*:*:*:* |
huawei | dp300_firmware | v500r002c00spc100 | cpe:2.3:o:huawei:dp300_firmware:v500r002c00spc100:*:*:*:*:*:*:* |
huawei | dp300_firmware | v500r002c00spc200 | cpe:2.3:o:huawei:dp300_firmware:v500r002c00spc200:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
46.3%