This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy

Security Advisory-SSLv3 POODLE Vulnerability in Huawei Products

  • SA No:Huawei-SA-20141215-01-POODLE
  • Initial Release Date: Dec 15, 2014
  • Last Release Date: May 05, 2015


The SSLv3 protocol supported by some Huawei products has the so-called Padding Oracle On Downgraded Legacy Encryption (POODLE) vulnerability. The attacker can launch a man-in-the-middle attack to manipulate the TLS negotiation process so that the communication parties use SSLv3, which has information disclosure vulnerability (vulnerability ID: HWPSIRT-2014-1041).

This Vulnerability has been assigned Common Vulnerabilities and Exposures (CVE) ID: CVE-2014-3566.

Product name

Affected Version

Resolved Product and Version

AC6005

V200R003C00
V200R005C00

V200R005C10

AC6605

V200R001C00
V200R002C00
V200R003C00
V200R005C00

V200R005C10

ACU2

V200R005C00

V200R005C10

AP3010DN-AGN-FAT/ AP5010DN-AGN-FAT/

AP5010SN-GN-FAT/ AP6010DN-AGN-FAT/ AP6010SN-GN-FAT/ AP6510DN-AGN-FAT/ AP6610DN-AGN-FAT

V200R003C00
V200R005C00

V200R005C10

AP5030DN-FAT/ AP5130DN-FAT/ AP7110DN-AGN-FAT

V200R005C00

V200R005C10

AR3200

V200R005C30

Upgrade to V200R005C32B190

V200R005C32

V200R005C32B190

BH620 V2

V100R002C00

V100R002C00SPC300

BH622 V2

V100R002C00

V100R002C00SPC300

CH121/ CH220/ CH221/ CH240/ CH242

V100R001C00

V100R001C00SPC200

CH140/ CH242 V3

V100R001C00

V100R001C00SPC130

CH222

V100R002C00

V100R002C00SPC200

E6000 Chassis

V100R001C00

V100R001C00SPC300

E9000 Chassis

V100R001C00

V100R001C00SPC201

eSight Network

V200R003C10

Upgrade to  V200R005C00SPC504

V200R005C00

V200R005C00SPC504

eSight UC&C

V100R001C01

Upgrade to V100R001C20SPC307

V100R001C20

V100R001C20SPC307

V100R002C00

eSight Solution V300R002C00SPC301

eSpace Agent Desktop

V200R001C03

Upgrade to eSpace CC V200R001C03SPC206B01f

eSpace ECS

V200R002C00

V200R002C00SPC202

eSpace U2980

V100R001C01
V100R001C02SPC200

Upgrade to V100R001C10SPC105

eSpace USM

V100R001C01

Upgrade to V100R001C10SPC105

V100R001 C10

V100R001C10SPC105

ManageOne SC

V100R002C20

Suse Patch (i585)

Suse Patch (x86_64)

Suse Patch (s390x)

ManageOne

V100R002C00/ C10/ C20

Suse Patch (i585)

Suse Patch (x86_64)

Suse Patch (s390x)

OceanStor ReplicationDirector

V100R002C10

Upgrade to V100R003C00SPC400

V100R003C00

V100R003C00SPC400

RH2288 V2

V100R002C00

V100R002C00SPC300

RH5885 V3

V100R003C00/ C01

V100R003C00SPC105

S12700

V200R005C00

V200R005SPH003

V200R006C00

V200R006SPH002

S2300/2700/3300/3700

V100R006C05

V100R006SPH020

V100R006C03

V100R006C00

S5300/5700/6300/6700

V200R001C00

V200R001SPH018

V200R003C00

V200R003SPH011

V200R005C00

V200R005SPH003

S5300/5700

V200R006C00

V200R006SPH003

S9300/9300E/7700/9700

V100R006C00

Upgrade to V200R003C00SPC300 and V200R003SPH010

V200R001C00

V200R001SPH022

V200R003C00

V200R03SPH010

V200R005C00

V200R005SPH003

V200R006C00

V200R006SPH002


Successful exploitation of the vulnerability may cause the encrypted communication to be decrypted by the attacker.

The vulnerability classification has been performed by using the CVSSv2 scoring system (http://www.first.org/cvss/).

Base Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Temporal Score: 3.6 (E:F/RL:O/RC:C)

1. Prerequisite:

The attacker can intercept the communication packets.

2. Attacking procedure:

SSLv3 does not completely protected encrypted content and may be exploited to launch man-in-the-middle attacks on SSLv3 links. Although TLS has been widely used as an alternative, attackers can manipulate the TLS negotiation so that communication parties use SSLv3 instead of TLS. Then, attackers can exploit the vulnerability of SSLv3 to decrypt encrypted communication.

Huawei Intrusion Prevention System (IPS) has included the signature (signature ID: 269360) for detecting and preventing attacks that attempt to exploit the POODLE vulnerability since Oct. 16, 2014. Please update your signature database to IPS_H20011000_20141016xx or later.

Customers should contact Huawei TAC (Huawei Technical Assistance Center) to request the upgrades, or obtain them through Huawei worldwide website at (http://support.huawei.com/enterprise) / (http://support.huawei.com/carrier/) / (http://consumer.huawei.com/cn/support/index.htm). For TAC contact information, please refer to Huawei worldwide website at http://www.huawei.com/en/security/psirt/report-vulnerabilities/index.htm.

This vulnerability was found firstly by Google's security team. Huawei PSIRT is not aware of any public announcements or malicious use of the vulnerability described in this advisory.

For security problems about Huawei products and solutions, please contact PSIRT@huawei.com.

For general problems about Huawei products and solutions, please directly contact Huawei TAC (Huawei Technical Assistance Center) to request the configuration or technical assistance.

2015-05-05 V1.3 UPDATED updated list of affected products

2015-03-24 V1.2 UPDATED updated list of affected products

2015-01-16 V1.1 UPDATED updated list of affected products

2014-12-15 V1.0 INITIAL

This document is provided on an "AS IS" basis and does not imply any kind of guarantee or warranty, either express or implied, including the warranties of merchantability or fitness for a particular purpose. In no event shall Huawei or any of its directly or indirectly controlled subsidiaries or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. Your use of the document, by whatsoever means, will be totally at your own risk. Huawei is entitled to amend or update this document from time to time.

Complete information for providing feedback on security vulnerability of Huawei products, getting support for Huawei security incident response services, and obtaining Huawei security vulnerability information, is available on Huawei's worldwide website at http://www.huawei.com/en/security/psirt/.