Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2015-8085


Huawei AR routers with software before V200R007C00SPC100; Quidway S9300 routers with software before V200R009C00; S12700 routers with software before V200R008C00SPC500; S9300, Quidway S5300, and S5300 routers with software before V200R007C00; and S5700 routers with software before V200R007C00SPC500 make it easier for remote authenticated administrators to obtain and decrypt passwords by leveraging selection of a reversible encryption algorithm.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 4.9, indicating it can be exploited remotely over the network with relatively low complexity without requiring user interaction . The vulnerability impacts confidentiality (data exposure), for affected systems. Impacting 14 products from huawei, from huawei, from huawei and 11 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

First disclosed in 2016, this vulnerability was reported during a period defined by widespread IoT adoption challenges, mobile security concerns, and the emergence of advanced persistent threat (APT) techniques. Contemporary mitigation strategies focused on secure development practices and third-party component vetting.


Published

2016-10-03T21:59:03.800

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 4.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-326

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System huawei s9300_firmware v200r005c00spc300 Yes
Operating System huawei s9300_firmware v200r006c00spc500 Yes
Hardware huawei s9300 - No
Operating System huawei s12700_firmware v200r005c00 Yes
Operating System huawei s12700_firmware v200r006c00 Yes
Hardware huawei s12700 - No
Operating System huawei quidway_s9300_firmware v200r001c00spc300 Yes
Operating System huawei quidway_s9300_firmware v200r002c00spc100 Yes
Operating System huawei quidway_s9300_firmware v200r003c00spc500 Yes
Hardware huawei quidway_s9300 - No
Operating System huawei ar_firmware v200r001 Yes
Operating System huawei ar_firmware v200r002 Yes
Operating System huawei ar_firmware v200r003 Yes
Operating System huawei ar_firmware v200r005c10 Yes
Operating System huawei ar_firmware v200r005c20 Yes
Operating System huawei ar_firmware v200r005c30 Yes
Hardware huawei ar - No
Operating System huawei quidway_s5300_firmware v200r001c00spc300 Yes
Hardware huawei quidway_s5300 - No
Operating System huawei s5700_firmware v200r001c00 Yes
Operating System huawei s5700_firmware v200r002c00 Yes
Operating System huawei s5700_firmware v200r003c00 Yes
Operating System huawei s5700_firmware v200r005c00 Yes
Operating System huawei s5700_firmware v200r006c00 Yes
Hardware huawei s5700 - No
Operating System huawei s5300_firmware v200r002c00 Yes
Operating System huawei s5300_firmware v200r005c00spc500 Yes
Operating System huawei s5300_firmware v200r006c00spc500 Yes
Hardware huawei s5300 - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For huawei's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.