Versions
CH222 V3 V100R001C00
CH140L V3 V100R001C00
RH2288H V3 V100R003C00
RH2288 V3 V100R003C00
1288H V5 V100R005C00
CH121 V5 V100R001C00
CH121L V5 V100R001C00
XH321 V3 V100R003C00
CH242 V5 V100R001C00
XH620 V3 V100R003C00
CH140 V3 V100R001C00
RH1288 V3 V100R003C00
CH220 V3 V100R001C00
XH310 V3 V100R003C00
XH321 V5 V100R005C00
CH242 V3 V100R001C00
2288H V5 V100R005C00
CH121 V3 V100R001C00
CH121L V3 V100R001C00
2488 V5 V100R005C00
Recent CVEs
CVE-2018-7943
There is an authentication bypass vulnerability in some Huawei servers. A remote attacker with low privilege may bypass the authentication by some special operations. Due to insufficient authentication, an attacker may exploit the vulnerability to get some sensitive information and high-level users' privilege.
CVE-2018-7949
The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a privilege escalation vulnerability. A remote attacker may send some specially crafted login messages to the affected products. Due to improper authentication design, successful exploit enables low privileged users to get or modify passwords of highly privileged users.
CVE-2018-7950
The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a JSON injection vulnerability due to insufficient input validation. An authenticated, remote attacker can launch a JSON injection to modify the password of administrator. Successful exploit may allow attackers to obtain the management privilege of the system.
CVE-2018-7951
The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a JSON injection vulnerability due to insufficient input validation. An authenticated, remote attacker can launch a JSON injection to modify the password of administrator. Successful exploit may allow attackers to obtain the management privilege of the system.
CVE-2018-7942
The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have an authentication bypass vulnerability. An unauthenticated, remote attacker may send some specially crafted messages to the affected products. Due to improper authentication design, successful exploit may cause some information leak.