This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy
Product Name |
Affected Version |
Resolved Product and Version |
S2300/S2700/S3300/S3700 |
V100R006C00 |
Upgrade to V100R006C03 |
V100R006C03 |
V100R006SPH021 |
|
V100R006C05 |
||
S5300EI/S5700EI/S5300SI/S5700SI |
V100R006C00 |
Upgrade to V200R003C00SPC300 |
V200R001C00SPC300 |
||
V200R002C00SPC300 |
||
V200R003C00SPC300 |
V200R003SPH011 |
|
V200R005C00SPC300 |
V200R005SPH005 |
|
S5300HI/S5700HI S6300EI/S6700EI/S5710HI |
V200R001C00SPC300 |
Upgrade to V200R003C00SPC300 |
V200R002C00SPC300 |
||
V200R003C00SPC300 |
V200R003SPH011 |
|
V200R005C00SPC300 |
V200R005SPH005 |
|
S5300LI/S5700LI/S2350EI/S2750EI |
V200R001C00SPC300 |
Upgrade to V200R003C00SPC300 |
V200R002C00SPC300 |
||
V200R003C00SPC300 |
V200R003SPH011 |
|
V200R005C00SPC300 |
V200R005SPH005 |
|
V200R006C00SPC500 |
V200R006SPH002 |
|
V200R007C00SPC500 |
V200R007SPH001 |
|
S5720HI |
V200R006C00SPC500 |
V200R006SPH002 |
V200R007C00SPC500 |
V200R007SPH001 |
|
S7700/S9300/S9700 |
V200R001C00SPC300 |
Upgrade to V200R003C00SPC500 |
V200R002C00SPC300 |
||
V200R003C00SPC500 |
V200R003SPH011 |
|
V200R005C00SPC300 |
V200R005SPH005 |
|
V200R006C00SPC500 |
V200R006SPH003 |
|
V200R007C00SPC500 |
V200R007SPH001 |
|
S12700 |
V200R005C00SPC300 |
V200R005SPH005 |
V200R006C00SPC500 |
V200R006SPH003 |
|
V200R007C00SPC500 |
V200R007SPH001 |
This vulnerability can be exploited only when the following conditions are present:
1. The attacker can visit the network where the device locates.
Vulnerability details:
The device does not verify the validity of some special fields of ICMP packets. Attackers can send abnormal ICMP packets to the device to cause the board reboot.