First published: Fri Jun 24 2016(Updated: )
Huawei OceanStor 5300 V3, 5500 V3, 5600 V3, 5800 V3, 6800 V3, 18800 V3, and 18500 V3 before V300R003C10 sends the plaintext session token in the HTTP header, which allows remote attackers to conduct replay attacks and obtain sensitive information by sniffing the network.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei OceanStor 18500 V3 | ||
Huawei OceanStor 18800 V3 | ||
Huawei OceanStor firmware | <=v300r003c00spc100 | |
Huawei OceanStor 5300 | ||
Huawei OceanStor 5500 V3 | ||
Huawei OceanStor S5600T | ||
Huawei OceanStor 5800 | ||
Huawei OceanStor S6800T | ||
Huawei OceanStor firmware | <=v300r002c10spc200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5722 is considered to have a high severity due to the potential for remote attackers to conduct replay attacks and access sensitive information.
To fix CVE-2016-5722, upgrade the affected Huawei OceanStor firmware to version V300R003C10 or later.
CVE-2016-5722 affects multiple models including Huawei OceanStor 5300, 5500, 5600, 5800, 6800, 18800, and 18500 before V300R003C10.
CVE-2016-5722 allows remote attackers to execute replay attacks by obtaining plaintext session tokens from HTTP headers.
Yes, CVE-2016-5722 is a network-related vulnerability that can be exploited through network sniffing.