Multiple Input Validation Issues in CIDAM Protocol Affecting Huawei Products
CVE-2017-17304

6.5MEDIUM

Key Information:

Vendor
Huawei
Vendor
CVE Published:
9 March 2018

Summary

The CIDAM Protocol implemented in various Huawei products is affected by several input validation vulnerabilities. These arise from inadequate validation processes for specific message types. An authenticated remote attacker could exploit this flaw by sending crafted messages to the affected systems. Successful exploitation may allow the attacker to manipulate business operations and disrupt normal system functionality. This vulnerability impacts a wide range of Huawei products across different versions, making it crucial for users to apply relevant security updates to safeguard their systems.

Affected Version(s)

DP300, RP200, TE30, TE40, TE50, TE60, eSpace U1981 V500R002C00

DP300, RP200, TE30, TE40, TE50, TE60, eSpace U1981 V500R002C00B010

DP300, RP200, TE30, TE40, TE50, TE60, eSpace U1981 V500R002C00B011

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.