First published: Mon Jan 11 2016(Updated: )
The Operation and Maintenance Unit (OMU) in Huawei VCN500 with software before V100R002C00SPC200 does not properly invalidate the session ID when an "abnormal exit" occurs, which allows remote attackers to conduct replay attacks via the session ID.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei VCN500 | =v100r002c00spc200b010 | |
Huawei VCN500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8331 is classified as a medium severity vulnerability due to its potential for remote session ID replay attacks.
To fix CVE-2015-8331, update the software of the Huawei VCN500 to version V100R002C00SPC200 or later.
CVE-2015-8331 allows attackers to conduct replay attacks by exploiting improperly invalidated session IDs during abnormal exits.
Yes, the Huawei VCN500 running software version before V100R002C00SPC200 is vulnerable to CVE-2015-8331.
If you cannot update your Huawei VCN500, consider implementing additional security measures, such as restricting network access to the device.