First published: Mon Oct 03 2016(Updated: )
Buffer overflow in the Point-to-Point Protocol over Ethernet (PPPoE) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600, when CHAP authentication is configured on the server, allows remote attackers to cause a denial of service (server restart) or execute arbitrary code via crafted packets sent during authentication.
Credit: psirt@huawei.com
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei E200E-USG2100 | =v300r001c00 | |
Huawei E200E-USG2100 | =v300r001c10 | |
Huawei USG2200 Firmware | =v300r001c00 | |
Huawei USG2200 Firmware | =v300r001c10 | |
Huawei USG5100 Firmware | =v300r001c00 | |
Huawei USG5100 Firmware | =v300r001c10 | |
Huawei USG5500 firmware | =v300r001c00 | |
Huawei USG5500 firmware | =v300r001c10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8276 is categorized as a high severity vulnerability due to its potential to cause a denial of service.
To mitigate CVE-2016-8276, you should upgrade to Huawei unified security gateway software version V300R001C10SPC600 or later.
CVE-2016-8276 affects Huawei USG2100, USG2200, USG5100, and USG5500 devices running specific firmware versions.
CVE-2016-8276 can be exploited by remote attackers through a buffer overflow, leading to a denial of service.
The vulnerability is particularly problematic when CHAP authentication is configured on the server.