This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy
Simple Network Management Protocol version 3(SNMPv3) is provided by Huawei for network and device management.
While the SNMPv3 is enable and debugging is turn on, attackers can make stack overflow by sending malformed SNMPv3 messages with shellcode encoded, and attack vulnerable equipment remotely. (Vulnerability ID: HWNSIRT-2013-0219)
These vulnerabilities were first reported by Roberto Paleari of Emaze Networks S.p.A. Huawei would like to thank Roberto Paleari and Emaze Networks S.p.A for reporting these issues and for working with us to help protect the security of our customers.
Currently, workarounds are available and fixed version has been provided.
More version information are detailed below.Solution:
The overflow vulnerabilities are fixed by checking the related data copy in SNMPv3 debugging module.
Product name |
Solved version |
Solved time |
AR 150/200/1200/2200/3200 |
Patch ARV200R002SPC006 for V200R002C01SPC200, V200R002C02SPC200 and V200R002C02SPC300 |
Released |
V200R003C01SPC100 |
Released |
The vulnerability classification has been performed by using the CVSSv2 scoring system
Base Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
Temporal Score: 6.5 (E:F/RL:T/RC:C)
Overall Score: 6.5
Following conditions must be satisfied:
Vulnerability details:
When parsing SNMPv3 messages and printing debugging information, The checking of information copy is not enough and the stack overflow maybe occur, resulting in attacking remotely.Workarounds: Connect to the device using SSH and turn off the debugging of SNMPv3. The detailed configuration is as follows(In the case of AR Router):
[Quidway]undo debugging snmp-agent headerCustomers should contact Huawei TAC (Huawei Technical Assistance Center) to request the upgrades, or obtain them through Huawei worldwide website at http://support.huawei.com/support/. For TAC contact information, please refer to Huawei worldwide website at
http://support.huawei.com/enterprise/NewsReadAction.action?contentId=NEWS1000000563.
For security problems about Huawei products and solutions, please contactPSIRT@huawei.com.
For general problems about Huawei products and solutions, please directly contact Huawei TAC (Huawei Technical Assistance Center) to request the configuration or technical assistance.
2013-3-13 V1.0 INITIAL
2013-3-22 V1.1 UPDATED update the affected version
2013-5-3 V1.2 UPDATED update the affected versionNone