CVE-2014-9692
Detail
Current Description
Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions could allow attackers to figure out the RMCP+ session IDs of users and access the system with forged identities.
View Analysis Description
Analysis
Description
Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions could allow attackers to figure out the RMCP+ session IDs of users and access the system with forged identities.
Severity
CVSS
Version 3.x
CVSS
Version 2.0
CVSS 3.x Severity and Metrics:
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.0 Severity and Metrics:
Vector:
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to nvd@nist.gov .
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
NIST
Change History
1 change records found show changes
Initial Analysis 4/05/2017 7:53:05 PM
Action
Type
Old Value
New Value
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_bh620_v2_firmware:v100r002c00spc107:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_bh620_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_bh621_v2_firmware:v100r002c00spc106:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_bh621_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_bh622_v2_firmware:v100r002c00spc110:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_bh622_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_bh640_v2_firmware:v100r002c00spc108:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_bh640_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_ch121_firmware:v100r001c00spc180:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_ch121:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_ch140_firmware:v100r001c00spc110:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_ch140:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_ch220_firmware:v100r001c00spc180:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_ch220:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_ch221_firmware:v100r001c00spc180:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_ch221:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_ch222_firmware:v100r002c00spc180:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_ch222:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_ch240_firmware:v100r001c00spc180:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_ch240:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_ch242_firmware:v100r001c00spc180:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_ch242:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_ch242_v3_firmware:v100r001c00spc110:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_ch242_v3:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_dh310_v2_firmware:v100r001c00spc110:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_dh310_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_dh320_v2_firmware:v100r001c00spc106:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_dh320_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_dh620_v2_firmware:v100r001c00spc106:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_dh620_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_dh621_v2_firmware:v100r001c00spc107:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_dh621_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_dh628_v2_firmware:v100r001c00spc107:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_dh628_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_rh1288_v2_firmware:v100r002c00spc107:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_rh1288_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_rh2265_v2_firmware:v100r002c00:*:*:*:*:*:*:*
OR
cpe:2.3:h:huawei:tecal_rh2265_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_rh2265_v2_firmware:v100r002c00:*:*:*:*:*:*:*
OR
cpe:2.3:h:huawei:tecal_rh2265_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_rh2268_v2_firmware:v100r002c00:*:*:*:*:*:*:*
OR
cpe:2.3:h:huawei:tecal_rh2268_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_rh2285_v2_firmware:v100r002c00spc115:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_rh2285_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_rh2285h_v2_firmware:v100r002c00spc111:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_rh2285h_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_rh2288_v2_firmware:v100r002c00spc117:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_rh2288_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_rh2288h_v2_firmware:v100r002c00spc115:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_rh2288h_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_rh2485_v2_firmware:v100r002c00spc502:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_rh2485_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_rh5885_v2_firmware:v100r001c02spc109:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_rh5885_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_rh5885_v3_firmware:v100r003c01spc102:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_rh5885_v3:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_rh5885h_v3_firmware:v100r003c00spc102:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_rh5885h_v3:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_xh310_v2_firmware:v100r001c00spc110:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_xh310_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_xh311_v2_firmware:v100r001c00spc110:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_xh311_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_xh320_v2_firmware:v100r001c00spc110:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_xh320_v2:-:*:*:*:*:*:*:*
Added
CPE Configuration
AND
OR
*cpe:2.3:o:huawei:tecal_xh621_v2_firmware:v100r001c00spc106:*:*:*:*:*:*:* (and previous)
OR
cpe:2.3:h:huawei:tecal_xh621_v2:-:*:*:*:*:*:*:*
Added
CVSS V2
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Added
CVSS V3
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Added
CWE
CWE-200
Changed
Reference Type
http://www.huawei.com/en/psirt/security-advisories/hw-408100 No Types Assigned
http://www.huawei.com/en/psirt/security-advisories/hw-408100 Vendor Advisory
Quick Info
CVE Dictionary Entry: CVE-2014-9692 NVD
Published Date: 04/02/2017 NVD
Last Modified: 04/05/2017
Source: Huawei Technologies