First published: Thu Sep 22 2016(Updated: )
Huawei AC6003, AC6005, AC6605, and ACU2 access controllers with software before V200R006C10SPC200 allows remote authenticated users to cause a denial of service (device restart) via crafted CAPWAP packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei AC6003 Firmware | <=v200r005c10 | |
Huawei AC6003 Firmware | <=v200r006c00 | |
Huawei WLAN AC6005 firmware | <=v200r005c10 | |
Huawei WLAN AC6005 firmware | <=v200r006c00 | |
Huawei WLAN AC6605 firmware | <=v200r005c10 | |
Huawei WLAN AC6605 firmware | =v200r006c00 | |
Huawei WLAN ACU2 firmware | <=v200r005c10 | |
Huawei WLAN ACU2 firmware | <=v200r006c00 | |
Huawei AC6003 firmware | ||
Huawei WLAN AC6005 firmware | ||
Huawei AC6605 firmware | ||
Huawei WLAN ACU2 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6824 has a medium severity rating due to its potential to cause denial of service by restarting affected devices.
To fix CVE-2016-6824, update the affected Huawei access controllers to software version V200R006C10SPC200 or later.
CVE-2016-6824 affects Huawei AC6003, AC6005, AC6605, and ACU2 access controllers running vulnerable software versions.
No, CVE-2016-6824 requires remote authenticated users to exploit the vulnerability.
CVE-2016-6824 can lead to service interruptions by causing affected devices to restart, impacting network availability.