This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy
The OceanStor 5300 V3/5500 V3/5600 V3/5800 V3/6800 V3/ 18800 V3/18500 V3 are mid-range and high-end storage products newly developed by Huawei Technologies Co., Ltd (Huawei for short). This series is ideal for processing existing storage applications and follows the future development trend of storage technologies. It meets medium- and large-sized enterprises' storage requirements for mass data storage, speed data access, high availability, high utilization, energy saving, and ease-of-use.
There is vulnerability in those products that the session token are included in HTTP header in plaintext, which allows attackers to launch replay attacks. It can lead to information leak and damage the product's integrity and availability. (Vulnerability ID: HWPSIRT-2016-05137)Huawei has released software updates to fix these vulnerabilities. This advisory is available at the following link:
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160615-01-oceanstor
Product Name |
Affected Version |
Resolved Product and Version |
OceanStor 5300/5500/5600/5800/6800/18800/18500 V3 |
V300R003C00SPC100 |
Upgrade to V300R003C10 |
OceanStor 5500/5300/5600/5800/6800 V3 |
V300R002C10SPC200 and earlier versions |
Upgrade to V300R003C10 |
An attacker can exploit this vulnerability to launch replay attacks. It can lead to information leak and damage the product's integrity and availability.
The vulnerability classification has been performed by using the CVSSv2 scoring system (http://www.first.org/cvss/).
Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Temporal Score: 5.6 (E:F/RL:O/RC:C)
This vulnerability can be exploited only when the following conditions are present:
Vulnerability details:
The session token are included in HTTP header in plaintext, which allows attackers to launch replay attacks. It can lead to information leak and damage the product's integrity and availability.
Customers should contact Huawei TAC (Huawei Technical Assistance Center) to request the upgrades. For TAC contact information, please refer to Huawei worldwide website at http://www.huawei.com/en/psirt/report-vulnerabilities.
This vulnerability was discovered by Huawei internal tester.
2016-06-27 V1.1 UPDATED Updated the CVE ID
2016-06-15 V1.0 INITIAL
None
Huawei adheres to protecting the ultimate interests of users with best efforts and the principle of responsible disclosure and deal with product security issues through our response mechanism.
To enjoy Huawei PSIRT services and obtain Huawei product vulnerability information, please visit http://www.huawei.com/en/psirt.
To report a security vulnerability in Huawei products and solutions, please send it to PSIRT@huawei.com. For details, please visit http://www.huawei.com/en/psirt/report-vulnerabilities.