Huawei E5756s has a web UI authentication vulnerability. As a result, an attacker can graft commands to view the device configuration information and perform operations, such as enabling PIN/PUK authentication without logging in to the web UI (Vulnerability ID: HWPSIRT-2015-03016).
This Vulnerability has been assigned Common Vulnerabilities and Exposures (CVE) ID: CVE-2015-4629.
Product Name
|
Affected Version
|
Fixed Versions
|
E5756s-2
|
V100R001B100D00SP00C00
|
V200R002B146D23SP00C00
|
The attacker can exploit this vulnerability to view the device configuration information and perform operations, such as enabling PIN/PUK authentication.
The vulnerability classification has been performed by using the CVSSv2 scoring system (http://www.first.org/cvss/).
Base score: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)
Temporal score: 5.3 (E:F/RL:O/RC:C)
1. This vulnerability can be exploited only when the following conditions are present:
The attacker gains access to the network.
2. Attacking procedure:
The attacker can exploit this vulnerability to view the device configuration information and perform operations, such as enabling PIN/PUK authentication without logging in to the web UI.
This vulnerability is discovered by an external researcher. Huawei PSIRT is not aware of any public announcements or malicious use of the vulnerability.
For security problems about Huawei products and solutions, please contact
PSIRT@huawei.com.
For general problems about Huawei products and solutions, please directly contact Huawei TAC (Huawei Technical Assistance Center) to request the configuration or technical assistance.
2015-06-17 V1.1 UPDATED added the CVE-ID
2015-06-15 V1.0 INITIAL
This document is provided on an "AS IS" basis and does not imply any kind of guarantee or warranty, either express or implied, including the warranties of merchantability or fitness for a particular purpose. In no event shall Huawei or any of its directly or indirectly controlled subsidiaries or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. Your use of the document, by whatsoever means, will be totally at your own risk. Huawei is entitled to amend or update this document from time to time.
Complete information for providing feedback on security vulnerability of Huawei products, getting support for Huawei security incident response services, and obtaining Huawei security vulnerability information, is available on Huawei's worldwide website at
http://www.huawei.com/en/security/psirt/.