ID

VAR-201604-0306


CVE

CVE-2016-3678


TITLE

plural Huawei Quidway Denial of service in switch product software (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2016-002072

DESCRIPTION

Huawei Quidway S9700, S5700, S5300, S9300, and S7700 switches with software before V200R003SPH012 allow remote attackers to cause a denial of service (switch restart) via crafted traffic. Huawei S9300, S5700, S5300, S9300, and S7700 are all S series switches of Huawei. There are security vulnerabilities in various HuaweiQuidway switches. Multiple Huawei Quidway S-Series Switches are prone to a denial-of-service vulnerability. Huawei Quidway S9700, S5700, S5300, S9300, and S7700 are all S-series switch products of China's Huawei (Huawei). The following products and versions are affected: Huawei Quidway S9700, S5700, S5300, S9300, and S7700 using software versions earlier than V200R003SPH012

Trust: 2.52

sources: NVD: CVE-2016-3678 // JVNDB: JVNDB-2016-002072 // CNVD: CNVD-2016-02160 // BID: 85731 // VULHUB: VHN-92497

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-02160

AFFECTED PRODUCTS

vendor:huaweimodel:s7700scope:eqversion:v200r003c00spc500

Trust: 1.6

vendor:huaweimodel:s9300scope:eqversion:v200r003c00spc500

Trust: 1.6

vendor:huaweimodel:s5700scope:eqversion:v200r003c00spc500

Trust: 1.6

vendor:huaweimodel:s5300scope:eqversion:v200r003c00spc500

Trust: 1.6

vendor:huaweimodel:s9700scope:eqversion:v200r003c00spc500

Trust: 1.6

vendor:huaweimodel:quidway s9700scope: - version: -

Trust: 1.4

vendor:huaweimodel:quidway s5700scope: - version: -

Trust: 1.4

vendor:huaweimodel:quidway s5300scope: - version: -

Trust: 1.4

vendor:huaweimodel:quidway s9300scope: - version: -

Trust: 1.4

vendor:huaweimodel:quidway s7700scope: - version: -

Trust: 1.4

vendor:huaweimodel:quidwayscope:ltversion:v200r003sph012

Trust: 0.8

sources: CNVD: CNVD-2016-02160 // JVNDB: JVNDB-2016-002072 // CNNVD: CNNVD-201604-178 // NVD: CVE-2016-3678

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-3678
value: HIGH

Trust: 1.0

NVD: CVE-2016-3678
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-02160
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201604-178
value: HIGH

Trust: 0.6

VULHUB: VHN-92497
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-3678
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-02160
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-92497
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-3678
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-02160 // VULHUB: VHN-92497 // JVNDB: JVNDB-2016-002072 // CNNVD: CNNVD-201604-178 // NVD: CVE-2016-3678

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-92497 // JVNDB: JVNDB-2016-002072 // NVD: CVE-2016-3678

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201604-178

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201604-178

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-002072

PATCH

title:huawei-sa-20160330-01-switchurl:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en

Trust: 0.8

title:Patches for multiple HuaweiQuidway switch denial of service vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/73980

Trust: 0.6

title:Multiple Huawei Quidway Repair measures for switch denial of service vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60879

Trust: 0.6

sources: CNVD: CNVD-2016-02160 // JVNDB: JVNDB-2016-002072 // CNNVD: CNNVD-201604-178

EXTERNAL IDS

db:NVDid:CVE-2016-3678

Trust: 3.4

db:JVNDBid:JVNDB-2016-002072

Trust: 0.8

db:CNNVDid:CNNVD-201604-178

Trust: 0.7

db:CNVDid:CNVD-2016-02160

Trust: 0.6

db:BIDid:85731

Trust: 0.3

db:VULHUBid:VHN-92497

Trust: 0.1

sources: CNVD: CNVD-2016-02160 // VULHUB: VHN-92497 // BID: 85731 // JVNDB: JVNDB-2016-002072 // CNNVD: CNNVD-201604-178 // NVD: CVE-2016-3678

REFERENCES

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-switch-en

Trust: 2.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-3678

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-3678

Trust: 0.8

url:http://www.huawei.com

Trust: 0.3

sources: CNVD: CNVD-2016-02160 // VULHUB: VHN-92497 // BID: 85731 // JVNDB: JVNDB-2016-002072 // CNNVD: CNNVD-201604-178 // NVD: CVE-2016-3678

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 85731

SOURCES

db:CNVDid:CNVD-2016-02160
db:VULHUBid:VHN-92497
db:BIDid:85731
db:JVNDBid:JVNDB-2016-002072
db:CNNVDid:CNNVD-201604-178
db:NVDid:CVE-2016-3678

LAST UPDATE DATE

2024-11-23T21:54:38.217000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-02160date:2016-04-13T00:00:00
db:VULHUBid:VHN-92497date:2016-04-14T00:00:00
db:BIDid:85731date:2016-03-30T00:00:00
db:JVNDBid:JVNDB-2016-002072date:2016-04-18T00:00:00
db:CNNVDid:CNNVD-201604-178date:2016-04-12T00:00:00
db:NVDid:CVE-2016-3678date:2024-11-21T02:50:29.710

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-02160date:2016-04-13T00:00:00
db:VULHUBid:VHN-92497date:2016-04-11T00:00:00
db:BIDid:85731date:2016-03-30T00:00:00
db:JVNDBid:JVNDB-2016-002072date:2016-04-18T00:00:00
db:CNNVDid:CNNVD-201604-178date:2016-04-12T00:00:00
db:NVDid:CVE-2016-3678date:2016-04-11T15:59:10.597