First published: Mon Dec 07 2015(Updated: )
Huawei USG5500, USG2100, USG2200, and USG5100 unified security gateways with software before V300R001C10SPC600, when "DHCP Snooping" is enabled and either "option82 insert" or "option82 rebuild" is enabled on an interface, allow remote attackers to cause a denial of service (reboot) via crafted DHCP packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei Unified Security Gateway Firmware | <=v300r001c10 | |
Huawei E200E-USG2100 | ||
Huawei USG2200 Firmware | ||
Huawei USG5100 Firmware | ||
Huawei USG5500 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8084 has a high severity rating as it can cause a denial of service via crafted DHCP packets.
To fix CVE-2015-8084, upgrade the Huawei Unified Security Gateway firmware to V300R001C10SPC600 or later.
CVE-2015-8084 affects Huawei USG5500, USG2100, USG2200, and USG5100 unified security gateways with versions before V300R001C10SPC600.
DHCP Snooping is a network security feature that validates DHCP messages and is linked to the vulnerability in CVE-2015-8084.
Yes, CVE-2015-8084 can be exploited remotely by attackers sending crafted DHCP packets.