First published: Thu Sep 22 2016(Updated: )
Buffer overflow in the Authentication, Authorization and Accounting (AAA) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600 allows remote authenticated RADIUS servers to execute arbitrary code by sending a crafted EAP packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei USG2100 Firmware | <=v300r001c00 | |
Huawei USG2100 Firmware | <=v300r001c10 | |
Huawei USG2200 | <=v300r001c00 | |
Huawei USG2200 | <=v300r001c10 | |
Huawei USG5100 | <=v300r001c00 | |
Huawei USG5100 | <=v300r001c10 | |
Huawei Unified Security Gateway Firmware | <=v300r001c00 | |
Huawei Unified Security Gateway Firmware | <=v300r001c10 | |
Huawei E200E-USG2100 | ||
Huawei E200 USG2200 | ||
Huawei E200 USG5100 | ||
Huawei USG5500 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6669 is considered a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2016-6669, you should upgrade to Huawei USG2100, USG2200, USG5100, or USG5500 firmware versions following V300R001C10SPC600.
CVE-2016-6669 affects Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways running vulnerable firmware.
CVE-2016-6669 enables remote authenticated RADIUS servers to execute arbitrary code through crafted EAP packets.
There are no documented workarounds for CVE-2016-6669; upgrading firmware is the recommended solution.