Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-9209


There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 6.7, requiring local system access to exploit with relatively low complexity without requiring user interaction . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 2 products from huawei, from huawei organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2021, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2021-01-13T23:15:13.807

Last Modified

2024-11-21T05:40:10.383

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.7 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

3.9

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-862

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System huawei smc2.0_firmware v600r006c00spc700 Yes
Operating System huawei smc2.0_firmware v600r006c00spc800 Yes
Operating System huawei smc2.0_firmware v600r006c10spc500 Yes
Operating System huawei smc2.0_firmware v600r006c10spc600 Yes
Operating System huawei smc2.0_firmware v600r006c10spc601 Yes
Operating System huawei smc2.0_firmware v600r006c10spc602 Yes
Operating System huawei smc2.0_firmware v600r006c10spc700 Yes
Operating System huawei smc2.0_firmware v600r006c10spc800 Yes
Operating System huawei smc2.0_firmware v600r006c10spca00 Yes
Operating System huawei smc2.0_firmware v600r006c10spcb00 Yes
Operating System huawei smc2.0_firmware v600r006c10spcc00 Yes
Operating System huawei smc2.0_firmware v600r006c10spcd00 Yes
Operating System huawei smc2.0_firmware v600r006c10spce00 Yes
Operating System huawei smc2.0_firmware v600r019c00 Yes
Operating System huawei smc2.0_firmware v600r019c10 Yes
Hardware huawei smc2.0 - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For huawei's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.