CVE-2014-9692

CVSS V2 Medium 5 CVSS V3 High 7.5
Description
Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions could allow attackers to figure out the RMCP+ session IDs of users and access the system with forged identities.
Overview
  • CVE ID
  • CVE-2014-9692
  • Assigner
  • psirt@huawei.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2017-04-02T20:59:00
  • Last Modified Date
  • 2017-04-05T23:53:04
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:huawei:tecal_rh1288_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r002c00spc107
cpe:2.3:h:huawei:tecal_rh1288_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_rh2265_v2_firmware:v100r002c00:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:tecal_rh2265_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_rh2285_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r002c00spc115
cpe:2.3:h:huawei:tecal_rh2285_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_rh2265_v2_firmware:v100r002c00:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:tecal_rh2265_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_rh2285h_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r002c00spc111
cpe:2.3:h:huawei:tecal_rh2285h_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_rh2268_v2_firmware:v100r002c00:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:tecal_rh2268_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_rh2288_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r002c00spc117
cpe:2.3:h:huawei:tecal_rh2288_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_rh2288h_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r002c00spc115
cpe:2.3:h:huawei:tecal_rh2288h_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_rh2485_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r002c00spc502
cpe:2.3:h:huawei:tecal_rh2485_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_rh5885_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c02spc109
cpe:2.3:h:huawei:tecal_rh5885_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_rh5885_v3_firmware:*:*:*:*:*:*:*:* 1 OR v100r003c01spc102
cpe:2.3:h:huawei:tecal_rh5885_v3:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_rh5885h_v3_firmware:*:*:*:*:*:*:*:* 1 OR v100r003c00spc102
cpe:2.3:h:huawei:tecal_rh5885h_v3:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_xh310_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc110
cpe:2.3:h:huawei:tecal_xh310_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_xh311_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc110
cpe:2.3:h:huawei:tecal_xh311_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_xh320_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc110
cpe:2.3:h:huawei:tecal_xh320_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_xh621_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc106
cpe:2.3:h:huawei:tecal_xh621_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_dh310_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc110
cpe:2.3:h:huawei:tecal_dh310_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_dh320_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc106
cpe:2.3:h:huawei:tecal_dh320_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_dh620_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc106
cpe:2.3:h:huawei:tecal_dh620_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_dh621_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc107
cpe:2.3:h:huawei:tecal_dh621_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_dh628_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc107
cpe:2.3:h:huawei:tecal_dh628_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_bh620_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r002c00spc107
cpe:2.3:h:huawei:tecal_bh620_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_bh621_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r002c00spc106
cpe:2.3:h:huawei:tecal_bh621_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_bh622_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r002c00spc110
cpe:2.3:h:huawei:tecal_bh622_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_bh640_v2_firmware:*:*:*:*:*:*:*:* 1 OR v100r002c00spc108
cpe:2.3:h:huawei:tecal_bh640_v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_ch121_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc180
cpe:2.3:h:huawei:tecal_ch121:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_ch140_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc110
cpe:2.3:h:huawei:tecal_ch140:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_ch220_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc180
cpe:2.3:h:huawei:tecal_ch220:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_ch221_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc180
cpe:2.3:h:huawei:tecal_ch221:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_ch222_firmware:*:*:*:*:*:*:*:* 1 OR v100r002c00spc180
cpe:2.3:h:huawei:tecal_ch222:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_ch240_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc180
cpe:2.3:h:huawei:tecal_ch240:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_ch242_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc180
cpe:2.3:h:huawei:tecal_ch242:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:tecal_ch242_v3_firmware:*:*:*:*:*:*:*:* 1 OR v100r001c00spc110
cpe:2.3:h:huawei:tecal_ch242_v3:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • NONE
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
http://www.huawei.com/en/psirt/security-advisories/hw-408100 Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 09:45:44 Added to TrackCVE
2022-12-02 15:24:31 2017-04-02T20:59Z 2017-04-02T20:59:00 CVE Published Date updated
2022-12-02 15:24:31 2017-04-05T23:53:04 CVE Modified Date updated
2022-12-02 15:24:31 Analyzed Vulnerability Status updated