First published: Sun Apr 02 2017(Updated: )
Huawei Secospace USG6300 with software V500R001C20 and V500R001C20SPC200PWE, Secospace USG6500 with software V500R001C20, Secospace USG6600 with software V500R001C20 and V500R001C20SPC200PWE allow remote attackers with specific permission to log in to a device and deliver a large number of unspecified commands to exhaust memory, causing a DoS condition.
Credit: psirt@huawei.com
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei Secospace USG6300 Firmware | =v500r001c20 | |
Huawei Secospace USG6300 Firmware | =v500r001c20spc200pwe | |
Huawei Secospace USG6300 firmware | ||
Huawei Secospace USG6500 | =v500r001c20 | |
Huawei Secospace USG6500 firmware | ||
Huawei Secospace USG6600 firmware | =v500r001c20 | |
Huawei Secospace USG6600 firmware | =v500r001c20spc200pwe | |
Huawei Secospace USG6600 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8781 has a severity rating that indicates it poses a significant risk to affected Huawei devices.
To fix CVE-2016-8781, users should update their Huawei Secospace USG6300, USG6500, or USG6600 devices to the latest firmware version provided by Huawei.
CVE-2016-8781 affects the Huawei Secospace USG6300, USG6500, and USG6600 devices running specific firmware versions.
CVE-2016-8781 allows remote attackers with specific permissions to log in and perform potentially harmful actions on the affected Huawei devices.
As of now, there is no widely known public exploit for CVE-2016-8781, but the vulnerability should still be taken seriously.