CVE-2020-1866
CVSS V2 Low 3.3
CVSS V3 Medium 6.5
Description
There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.
Overview
- CVE ID
- CVE-2020-1866
- Assigner
- psirt@huawei.com
- Vulnerability Status
- Analyzed
- Published Version
- 2021-01-13T23:15:13
- Last Modified Date
- 2021-01-19T17:12:35
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc300:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:* | 0 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:A/AC:L/Au:N/C:N/I:N/A:P
- Access Vector
- ADJACENT_NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- NONE
- Availability Impact
- PARTIAL
- Base Score
- 3.3
- Severity
- LOW
- Exploitability Score
- 6.5
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Attack Vector
- ADJACENT_NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- HIGH
- Base Score
- 6.5
- Base Severity
- MEDIUM
- Exploitability Score
- 2.8
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2020-1866 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1866 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 07:27:00 | Added to TrackCVE | |||
2022-12-05 20:11:16 | 2021-01-13T23:15Z | 2021-01-13T23:15:13 | CVE Published Date | updated |
2022-12-05 20:11:16 | 2021-01-19T17:12:35 | CVE Modified Date | updated | |
2022-12-05 20:11:16 | Analyzed | Vulnerability Status | updated |