This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy
Cross-site request forgery (CSRF) vulnerabilities are discovered in multiple products, including FusionManager (Vulnerability ID: HWPSIRT-2014-0408) and USG firewall series (Vulnerability ID: HWPSIRT-2014-0406).
Vulnerabilities in the web interface of these devices could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface. By exploiting the vulnerabilities, attackers manipulate the device, compromise legitimate services and perform other malicious activities.
Vulnerability HWPSIRT-2014-0408 has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2014-9136.
Vulnerability HWPSIRT-2014-0406 has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2014-9137.
By exploiting the vulnerability, attackers can manipulate the device, compromise legitimate services and perform other malicious activities.
The vulnerability classification has been performed by using the CVSSv2 scoring system (http://www.first.org/cvss/).
HWPSIRT-2014-0408:
Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Temporal Score: 5.6 (E:F/RL:O/RC:C)
Overall Score: 5.6
HWPSIRT-2014-0406:
Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Temporal Score: 5.6 (E:F/RL:O/RC:C)
Overall Score: 5.6
This vulnerability can be exploited only when the following conditions are present:
An authenticated user logs in to the device.
Vulnerability details:
The vulnerabilities are due to insufficient CSRF protections. An attacker could exploit these vulnerabilities by persuading an authenticated user of the affected device to follow a malicious link or visit a malicious website. A successful exploit could allow an attacker to submit arbitrary requests to the affected device with the privileges of the user.
Product Name |
Affected Version |
Solved version |
FusionManager |
All V100R002C03 versions |
V100R003C10SPC500 |
All V100R003C00 versions |
||
USG9500 |
V200R001C01SPC800 and earlier versions |
V200R001C01SPC900 |
All V300R001C00 versions |
V300R001C01SPC300 |
|
USG2100 |
V300R001C00SPC900 and earlier versions |
V300R001C10SPC200+SPH201 |
USG2200 |
V300R001C00SPC900 |
V300R001C10SPC200+SPH201 |
USG5100 |
V300R001C00SPC900 |
V300R001C10SPC200+SPH201 |
USG5500 |
V300R001C00SPC900 |
V300R001C10SPC200+SPH201 |
Customers should contact Huawei TAC (Huawei Technical Assistance Center) to request the upgrades, or obtain them through Huawei worldwide website at (http://support.huawei.com/enterprise) / (http://support.huawei.com/carrier/) / (http://consumer.huawei.com/cn/support/index.htm). For TAC contact information, please refer to Huawei worldwide website at http://www.huawei.com/en/security/psirt/report-vulnerabilities/index.htm.
This vulnerability was found by Huawei engineer. Huawei PSIRT is not aware of any public announcements or malicious use of the vulnerability described in this advisory.
For security problems about Huawei products and solutions, please contactPSIRT@huawei.com.
For general problems about Huawei products and solutions, please directly contact Huawei TAC (Huawei Technical Assistance Center) to request the configuration or technical assistance.
2014-09-24 V1.0 INITIAL