Versions
TE50 V500R002C00
Secospace USG6300 V500R001C00
USG6300 V100R001C10
TE60 V100R001C01SPC100
V500R002C00
V100R011C03SPC200
TE50 V600R006C00
Secospace USG6500 V500R001C00
V500R002C00B012
TE30 V100R001C10SPC300
V100R001C10B019
NIP6600 V500R001C00
V500R002C00SPC100
V100R002C00SPC800
USG9500 V500R001C00
V100R001C10B001
V100R001C10SPC700
V500R002C00B011
V100R001C10B012
IPS Module V500R001C00
V100R001C10SPC900
V100R001C10SPC500
V500R002C00B013
TE50 V500R002C00SPC600
V100R001C10SPC300
V100R001C10B016
V500R002C00SPC300
V500R002C00SPC900
V100R011C03
eSpace U1960 V200R003C30SPC200
V100R001C10SPC200B010
S1700 V200R006C10
TE30 V100R001C10
V100R001C10B013
V200R003C20SPCa00
V100R011C03LGWL01SPC100
TE40 V500R002C00
V500R002C00SPC400
S2700 V200R006C10
V100R002C10
V500R001C00
V100R001C10B002
V600R006C00SPC200
V100R011C03B012SP16
V500R001C30
V100R001C10B018
V100R002C00SPC400
S5700 V200R006C00
V500R002C00SPC700
V100R001C10B014
DP300 V500R002C00, TE60 V600R006C00, TP3106 V100R002C00, eSpace U1981 V200R003C30SPC100
DP300 V500R002C00
V500R002C00SPC300T
V100R001C01SPC107TB010
V500R002C00SPCa00
ViewPoint 9030 V100R011C02SPC100
V500R002C00B010
RSE6500 V500R002C00SPC100
S7700 V200R007C00
V100R001C10B011
V100R001C30
V100R011C03SPC300
V200R007C00
V500R002C00T
V600R006C00
RP200 V500R002C00
V100R002C00SPC700
TP3106 V100R002C00
V100R011C03SPC400
V500R002C00B017
V200R010C00
TE60 V100R001C10
Secospace USG6500 V100R001C10
V100R011C03B012SP15
S9700 V200R007C00
V200R007C01
V600R006C00SPC100
TP3206 V100R002C00
V500R001C20
V100R001C10B017
eSpace U1981 V100R001C20SPC700
V100R011C03SPC100
TE60 V100R001C01
V100R001C10SPC600
Secospace USG6600 V500R001C00
VP9660 V500R002C10
V100R001C10B010
ViewPoint 9030 V100R011C02
V200R009C00
V200R008C00
V500R002C00SPC800
TE40 V500R002C00SPC600
V500R002C00SPCe00
V100R001C10SPC800
TE30 V100R001C02
V100R001C10SPC800B011
V500R001C50
Secospace USG6600 V100R001C00
V100R011C03B015SP03
V100R001C10SPC400
S12700 V200R007C00
V500R001C30S
V500R002C00SPC200
V500R002C00B018
V100R001C20
V100R001C10SPC700B010
V500R002C00SPCd00
V100R002C00SPC600
V500R002C00B014
RP200 V600R006C00
V100R001C10
V500R002C00SPC600
V500R002C00SPC500
NIP6300 V500R001C00
RP200 V500R002C00SPC200
S6700 V200R008C00
V100R001C10SPC100
NGFW Module V500R001C00
V100R002C00SPC200
V100R011C03SPC500
V600R006C00SPC300
V500R002C00SPCb00
Recent CVEs
CVE-2017-17317
Common Open Policy Service Protocol (COPS) module in Huawei USG6300 V100R001C10; V100R001C20; V100R001C30; V500R001C00; V500R001C20; V500R001C30; V500R001C50; Secospace USG6500 V100R001C10; V100R001C20; V100R001C30; V500R001C00; V500R001C20; V500R001C30; V500R001C50; Secospace USG6600 V100R001C00; V100R001C20; V100R001C30; V500R001C00; V500R001C20; V500R001C30; V500R001C50; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00 has a buffer overflow vulnerability. An unauthenticated, remote attacker has to control the peer device and send specially crafted message to the affected products. Due to insufficient input validation, successful exploit may cause some services abnormal.
CVE-2017-17199
Huawei DP300 V500R002C00; RP200 V500R002C00; V600R006C00; TE30 V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00 have an out-of-bounds read vulnerability due to the improper processing of malformed H323 messages. A remote attacker that controls a server could exploit this vulnerability by sending malformed H323 reply messages to a target device. Successful exploit could make the device read out of bounds and probably make a service unavailable.
CVE-2017-17148
Huawei DP300 V500R002C00 have a DoS vulnerability due to the lack of validation when the malloc is called. An authenticated local attacker can craft specific XML files to the affected products and parse this file, which result in DoS attacks.
CVE-2017-17167
Huawei DP300 V500R002C00; TP3206 V100R002C00; ViewPoint 9030 V100R011C02; V100R011C03 have a use of a broken or risky cryptographic algorithm vulnerability. The software uses risky cryptographic algorithm in SSL. This is dangerous because a remote unauthenticated attacker could use well-known techniques to break the algorithm. Successful exploit could result in the exposure of sensitive information.
CVE-2017-17200
Huawei DP300 V500R002C00; RP200 V500R002C00; V600R006C00; TE30 V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00 have an out-of-bounds read vulnerability due to the improper processing of malformed H323 messages. A remote attacker that controls a server could exploit this vulnerability by sending malformed H323 reply messages to a target device. Successful exploit could make the device read out of bounds and probably make a service unavailable.
CVE-2017-17219
SCCPX module in Huawei DP300 V500R002C00; RP200 V500R002C00; V600R006C00; TE30 V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00 has an invalid memory access vulnerabilities. An unauthenticated, remote attacker crafts malformed packets with specific parameter to the affected products. Due to insufficient validation of packets, successful exploitation may impact availability of product service.
CVE-2017-17281
SFTP module in Huawei DP300 V500R002C00; RP200 V600R006C00; TE30 V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00 has an out-of-bounds read vulnerability. A remote, authenticated attacker could exploit this vulnerability by sending specially crafted messages to a target device. Successful exploit may cause some information leak.
CVE-2017-17217
Media Gateway Control Protocol (MGCP) in Huawei DP300 V500R002C00; RP200 V500R002C00SPC200; V600R006C00; TE30 V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00 has an out-of-bounds write vulnerability. An unauthenticated, remote attacker crafts malformed packets with specific parameter to the affected products. Due to insufficient validation of packets, successful exploitation may impact availability of product service.
CVE-2017-17134
XML parser in Huawei DP300 V500R002C00; RP200 V500R002C00SPC200; V600R006C00; TE30 V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00 has a DoS vulnerability. Due to not check the specially XML file enough an authenticated local attacker may craft specific XML files to the affected products and parse this file which cause to null pointer accessing and result in DoS attacks.
CVE-2017-17143
SIP module in Huawei DP300 V500R002C00; V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC400; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC800; V500R002C00SPC900; V500R002C00SPCa00; RP200 V500R002C00SPC200; V600R006C00; V600R006C00SPC200; RSE6500 V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC300T; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC700; V500R002C00T; TE30 V100R001C10; V100R001C10SPC100; V100R001C10SPC200B010; V100R001C10SPC300; V100R001C10SPC500; V100R001C10SPC600; V100R001C10SPC700B010; V100R001C10SPC800; V500R002C00SPC200; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC900; V500R002C00SPCb00; V600R006C00; TE40 V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC900; V500R002C00SPCb00; V600R006C00; V600R006C00SPC200; TE50 V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPCb00; V600R006C00; V600R006C00SPC200; TE60 V100R001C01SPC100; V100R001C01SPC107TB010; V100R001C10; V100R001C10SPC300; V100R001C10SPC400; V100R001C10SPC500; V100R001C10SPC600; V100R001C10SPC700; V100R001C10SPC800; V100R001C10SPC900; V500R002C00; V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC800; V500R002C00SPC900; V500R002C00SPCa00; V500R002C00SPCb00; V500R002C00SPCd00; V600R006C00; V600R006C00SPC100; V600R006C00SPC200; V600R006C00SPC300; TP3106 V100R002C00; V100R002C00SPC200; V100R002C00SPC400; V100R002C00SPC600; V100R002C00SPC700; V100R002C00SPC800; TP3206 V100R002C00; V100R002C00SPC200; V100R002C00SPC400; V100R002C00SPC600; V100R002C00SPC700; V100R002C10; ViewPoint 9030 V100R011C02SPC100; V100R011C03B012SP15; V100R011C03B012SP16; V100R011C03B015SP03; V100R011C03LGWL01SPC100; V100R011C03SPC100; V100R011C03SPC200; V100R011C03SPC300; V100R011C03SPC400; V100R011C03SPC500; eSpace U1960 V200R003C30SPC200; eSpace U1981 V100R001C20SPC700; V200R003C20SPCa00 has an overflow vulnerability that the module cannot parse a malformed SIP message when validating variables. Attacker can exploit it to make one process reboot at random.