The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
This vulnerability carries a LOW severity rating with a CVSS v3.1 score of 3.7, indicating it can be exploited remotely over the network but requires specific conditions to be met without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts and limited availability for affected systems. Impacting 52 products from huawei, from huawei, from huawei and 49 others, organizations running these solutions should prioritize assessment and patching.
First disclosed in 2018, this vulnerability was reported during a period defined by widespread IoT adoption challenges, mobile security concerns, and the emergence of advanced persistent threat (APT) techniques. Contemporary mitigation strategies focused on secure development practices and third-party component vetting.
2018-02-15T16:29:00.657
2024-11-21T03:14:29.783
Modified
CVSSv3.0: 3.7 (LOW)
AV:N/AC:M/Au:N/C:N/I:N/A:P
8.6
2.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | huawei | dp300_firmware | v500r002c00 | Yes |
| Hardware | huawei | dp300 | - | No |
| Operating System | huawei | ips_module_firmware | v100r001c10 | Yes |
| Operating System | huawei | ips_module_firmware | v100r001c20 | Yes |
| Operating System | huawei | ips_module_firmware | v100r001c30 | Yes |
| Operating System | huawei | ips_module_firmware | v500r001c00 | Yes |
| Operating System | huawei | ips_module_firmware | v500r001c20 | Yes |
| Operating System | huawei | ips_module_firmware | v500r001c30 | Yes |
| Operating System | huawei | ips_module_firmware | v500r001c50 | Yes |
| Hardware | huawei | ips_module | - | No |
| Operating System | huawei | ngfw_module_firmware | v100r001c10 | Yes |
| Operating System | huawei | ngfw_module_firmware | v100r001c20 | Yes |
| Operating System | huawei | ngfw_module_firmware | v100r001c30 | Yes |
| Operating System | huawei | ngfw_module_firmware | v500r001c00 | Yes |
| Operating System | huawei | ngfw_module_firmware | v500r001c20 | Yes |
| Operating System | huawei | ngfw_module_firmware | v500r002c00 | Yes |
| Operating System | huawei | ngfw_module_firmware | v500r002c10 | Yes |
| Hardware | huawei | ngfw_module | - | No |
| Operating System | huawei | nip6300_firmware | v500r001c00 | Yes |
| Operating System | huawei | nip6300_firmware | v500r001c20 | Yes |
| Operating System | huawei | nip6300_firmware | v500r001c30 | Yes |
| Operating System | huawei | nip6300_firmware | v500r001c50 | Yes |
| Hardware | huawei | nip6300 | - | No |
| Operating System | huawei | nip6600_firmware | v500r001c00 | Yes |
| Operating System | huawei | nip6600_firmware | v500r001c20 | Yes |
| Operating System | huawei | nip6600_firmware | v500r001c30 | Yes |
| Operating System | huawei | nip6600_firmware | v500r001c50 | Yes |
| Hardware | huawei | nip6600 | - | No |
| Operating System | huawei | nip6800_firmware | v500r001c50 | Yes |
| Hardware | huawei | nip6800 | - | No |
| Operating System | huawei | rp200_firmware | v500r002c00 | Yes |
| Operating System | huawei | rp200_firmware | v600r006c0 | Yes |
| Hardware | huawei | rp200 | - | No |
| Operating System | huawei | svn5600_firmware | v200r003c00 | Yes |
| Operating System | huawei | svn5600_firmware | v200r003c10 | Yes |
| Hardware | huawei | svn5600 | - | No |
| Operating System | huawei | svn5800_firmware | v200r003c00 | Yes |
| Operating System | huawei | svn5800_firmware | v200r003c10 | Yes |
| Hardware | huawei | svn5800 | - | No |
| Operating System | huawei | svn5800-c_firmware | v200r003c00 | Yes |
| Operating System | huawei | svn5800-c_firmware | v200r003c10 | Yes |
| Hardware | huawei | svn5800-c | - | No |
| Operating System | huawei | semg9811_firmware | v300r001c01 | Yes |
| Hardware | huawei | semg9811 | - | No |
| Operating System | huawei | secospace_usg6300_firmware | v100r001c10 | Yes |
| Operating System | huawei | secospace_usg6300_firmware | v100r001c20 | Yes |
| Operating System | huawei | secospace_usg6300_firmware | v100r001c30 | Yes |
| Operating System | huawei | secospace_usg6300_firmware | v500r001c00 | Yes |
| Operating System | huawei | secospace_usg6300_firmware | v500r001c20 | Yes |
| Operating System | huawei | secospace_usg6300_firmware | v500r001c30 | Yes |
| Operating System | huawei | secospace_usg6300_firmware | v500r001c50 | Yes |
| Hardware | huawei | secospace_usg6300 | - | No |
| Operating System | huawei | secospace_usg6500_firmware | v100r001c10 | Yes |
| Operating System | huawei | secospace_usg6500_firmware | v100r001c20 | Yes |
| Operating System | huawei | secospace_usg6500_firmware | v100r001c30 | Yes |
| Operating System | huawei | secospace_usg6500_firmware | v500r001c00 | Yes |
| Operating System | huawei | secospace_usg6500_firmware | v500r001c20 | Yes |
| Operating System | huawei | secospace_usg6500_firmware | v500r001c30 | Yes |
| Operating System | huawei | secospace_usg6500_firmware | v500r001c50 | Yes |
| Hardware | huawei | secospace_usg6500 | - | No |
| Operating System | huawei | secospace_usg6600_firmware | v100r001c00 | Yes |
| Operating System | huawei | secospace_usg6600_firmware | v100r001c20 | Yes |
| Operating System | huawei | secospace_usg6600_firmware | v100r001c30 | Yes |
| Operating System | huawei | secospace_usg6600_firmware | v500r001c00 | Yes |
| Operating System | huawei | secospace_usg6600_firmware | v500r001c20 | Yes |
| Operating System | huawei | secospace_usg6600_firmware | v500r001c30 | Yes |
| Operating System | huawei | secospace_usg6600_firmware | v500r001c50 | Yes |
| Hardware | huawei | secospace_usg6600 | - | No |
| Operating System | huawei | te30_firmware | v100r001c02 | Yes |
| Operating System | huawei | te30_firmware | v100r001c10 | Yes |
| Operating System | huawei | te30_firmware | v500r002c00 | Yes |
| Operating System | huawei | te30_firmware | v600r006c00 | Yes |
| Hardware | huawei | te30 | - | No |
| Operating System | huawei | te40_firmware | v500r002c00 | Yes |
| Operating System | huawei | te40_firmware | v600r006c00 | Yes |
| Hardware | huawei | te40 | - | No |
| Operating System | huawei | te50_firmware | v500r002c00 | Yes |
| Operating System | huawei | te50_firmware | v600r006c00 | Yes |
| Hardware | huawei | te50 | - | No |
| Operating System | huawei | te60_firmware | v100r001c01 | Yes |
| Operating System | huawei | te60_firmware | v100r001c10 | Yes |
| Operating System | huawei | te60_firmware | v500r002c00 | Yes |
| Operating System | huawei | te60_firmware | v600r006c00 | Yes |
| Hardware | huawei | te60 | - | No |
| Operating System | huawei | usg9500_firmware | v500r001c00 | Yes |
| Operating System | huawei | usg9500_firmware | v500r001c20 | Yes |
| Operating System | huawei | usg9500_firmware | v500r001c30 | Yes |
| Hardware | huawei | usg9500 | - | No |
| Operating System | huawei | usg9520_firmware | v300r001c01 | Yes |
| Operating System | huawei | usg9520_firmware | v300r001c20 | Yes |
| Hardware | huawei | usg9520 | - | No |
| Operating System | huawei | usg9560_firmware | v300r001c01 | Yes |
| Operating System | huawei | usg9560_firmware | v300r001c20 | Yes |
| Hardware | huawei | usg9560 | - | No |
| Operating System | huawei | usg9580_firmware | v300r001c01 | Yes |
| Operating System | huawei | usg9580_firmware | v300r001c20 | Yes |
| Hardware | huawei | usg9580 | - | No |
| Operating System | huawei | vp9660_firmware | v200r001c02 | Yes |
| Operating System | huawei | vp9660_firmware | v200r001c30 | Yes |
| Operating System | huawei | vp9660_firmware | v500r002c00 | Yes |
| Operating System | huawei | vp9660_firmware | v500r002c10 | Yes |
| Hardware | huawei | vp9660 | - | No |
| Operating System | huawei | viewpoint_8660_firmware | v100r008c03 | Yes |
| Hardware | huawei | viewpoint_8660 | - | No |
| Operating System | huawei | viewpoint_9030_firmware | v100r011c02 | Yes |
| Operating System | huawei | viewpoint_9030_firmware | v100r011c03 | Yes |
| Hardware | huawei | viewpoint_9030 | - | No |
| Operating System | huawei | espace_u1981_firmware | v100r001c20 | Yes |
| Operating System | huawei | espace_u1981_firmware | v200r003c00 | Yes |
| Operating System | huawei | espace_u1981_firmware | v200r003c20 | Yes |
| Operating System | huawei | espace_u1981_firmware | v200r003c30 | Yes |
| Hardware | huawei | espace_u1981 | - | No |
SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For huawei's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.