First published: Mon May 23 2016(Updated: )
Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei NIP6300 firmware | ||
Huawei NIP6300 firmware | =v500r001c00 | |
Huawei Secospace USG6500 firmware | ||
Huawei Secospace USG6500 | =v500r001c00 | |
Huawei Secospace AntiDDoS8000 | ||
Huawei Secospace AntiDDoS8000 | =v500r001c00 | |
Huawei Eudemon USG9500 | ||
Huawei Unified Security Gateway Firmware | =v500r001c00 | |
Huawei Secospace USG6300 firmware | ||
Huawei Secospace USG6300 Firmware | =v500r001c00 | |
Huawei NGFW Module | ||
Huawei NGFW Module firmware | =v500r001c00 | |
Huawei Secospace USG6600 firmware | ||
Huawei Secospace USG6600 firmware | =v500r001c00 | |
Huawei NIP6600 firmware | ||
Huawei NIP6600 | =v500r001c00 | |
Huawei IPS Module firmware | ||
Huawei IPS firmware | =v500r001c00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4576 is classified as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2016-4576, upgrade the affected Huawei devices to firmware version V500R001C20SPC100 or later.
CVE-2016-4576 affects Huawei devices including NIP6300, NIP6600, USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 running specific firmware versions.
Yes, CVE-2016-4576 can be exploited remotely by attackers to trigger a buffer overflow.
Exploitation of CVE-2016-4576 can lead to a denial of service, disrupting the functionality of the affected devices.