Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6jrf-2v62-hpgg

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have an input validation vulnerability where the IPSec module does not validate a field in a specific message. Attackers can send specific message to cause out-of-bound read, compromising normal service.

Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have an input validation vulnerability where the IPSec module does not validate a field in a specific message. Attackers can send specific message to cause out-of-bound read, compromising normal service.

EPSS

Процентиль: 48%
0.00251
Низкий

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.5
nvd
почти 6 лет назад

Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have an input validation vulnerability where the IPSec module does not validate a field in a specific message. Attackers can send specific message to cause out-of-bound read, compromising normal service.

EPSS

Процентиль: 48%
0.00251
Низкий

Дефекты

CWE-20