- Description
- There is an out of bounds read vulnerability in eSE620X vESS V100R001C10SPC200, V100R001C20SPC200, V200R001C00SPC300. A local attacker can exploit this vulnerability by sending specific message to the target device. Due to insufficient validation of internal message, successful exploit may cause the process and the service abnormal.
- Source
- psirt@huawei.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 3.3
- Impact score
- 1.4
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
- Severity
- LOW
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:P
- nvd@nist.gov
- CWE-125
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ese620x_vess_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3D09A362-885C-4CAD-931B-ECFBB857F849"
},
{
"criteria": "cpe:2.3:o:huawei:ese620x_vess_firmware:v100r001c20spc200:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BB48C0D8-E413-411E-9565-9AABA0A70CD1"
},
{
"criteria": "cpe:2.3:o:huawei:ese620x_vess_firmware:v200r001c00spc300:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "60AA30F0-E1A9-4D25-AE84-6CF952FD8E97"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ese620x_vess:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9AC039E0-A953-4C79-B751-5B9738371DF0"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]