First published: Thu Jun 20 2013(Updated: )
The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei AR 18-1x | <=r0130 | |
Huawei AR 18-2x | <=r1712 | |
Huawei AR 18-3x | <=r0118 | |
Huawei AR 19/29/49 | <=r2207 | |
Huawei AR 28/46 | <=r0311 | |
Huawei S2000 | =r6305 | |
Huawei S2300 Firmware | =r6305 | |
Huawei S2700 | =r6305 | |
Huawei S3000 | =r6305 | |
Huawei S3300 firmware | =r6305 | |
Huawei Campus S3300HI | =r6305 | |
Huawei S3500 | =r6305 | |
Huawei Campus S3700HI | =r6305 | |
Huawei S3900 | =r6305 | |
Huawei S5100 | =r6305 | |
Huawei S5600 | =r6305 | |
Huawei CloudEngine 7800 | =r6305 | |
Huawei S8500 | =r1631 | |
Huawei S8500 | =r1632 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6571 is classified as a high severity vulnerability due to its potential for session hijacking.
To fix CVE-2012-6571, update your Huawei devices to the latest firmware versions that address this vulnerability.
CVE-2012-6571 affects multiple Huawei products, including certain models of AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches.
CVE-2012-6571 allows attackers to exploit systems by leveraging predictable Session ID values to hijack active sessions.
If you cannot update your devices to mitigate CVE-2012-6571, consider implementing additional security measures, such as network segmentation and enhanced monitoring.