Input Validation Flaws in CIDAM Protocol on Huawei Devices
CVE-2017-17169
6.5MEDIUM
Key Information:
- Vendor
- Huawei
- Vendor
- CVE Published:
- 9 March 2018
Summary
The CIDAM Protocol in various Huawei devices contains multiple input validation vulnerabilities stemming from inadequate processing of malicious input messages. An authenticated remote attacker could exploit these vulnerabilities by sending specially crafted messages to target systems, potentially resulting in unauthorized manipulation of business functions and abnormal behavior of affected devices. These flaws highlight the importance of secure message validation in protocol implementations.
Affected Version(s)
DP300, RP200, TE30, TE40, TE50, TE60, eSpace U1981 V500R002C00
DP300, RP200, TE30, TE40, TE50, TE60, eSpace U1981 V500R002C00B010
DP300, RP200, TE30, TE40, TE50, TE60, eSpace U1981 V500R002C00B011
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved