
21/1/2020

5/8/2024
CVE-2019-19411
First published: Tue Jan 21 2020(Updated: )
USG9500 with versions of V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 have an information leakage vulnerability. Due to improper processing of the initialization vector used in a specific encryption algorithm, an attacker who gains access to this cryptographic primitive may exploit this vulnerability to cause the value of the confidentiality associated with its use to be diminished.
Credit: psirt@huawei.com
Affected Software | Affected Version | How to fix |
---|
Huawei USG9500 firmware | =v500r001c30spc100 | |
Huawei USG9500 firmware | =v500r001c30spc200 | |
Huawei USG9500 firmware | =v500r001c30spc600 | |
Huawei USG9500 firmware | =v500r001c60spc500 | |
Huawei USG9500 firmware | =v500r005c00spc100 | |
Huawei USG9500 firmware | =v500r005c00spc200 | |
Huawei Eudemon USG9500 | | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the vulnerability ID of this vulnerability?
The vulnerability ID is CVE-2019-19411.
What is the severity level of CVE-2019-19411?
The severity level of CVE-2019-19411 is medium.
Which versions of USG9500 are affected by CVE-2019-19411?
Versions V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, and V500R005C00SPC200 of USG9500 are affected by CVE-2019-19411.
What is the description of the vulnerability?
USG9500 with the affected versions has an information leakage vulnerability due to improper processing of the initialization vector used in a specific encryption algorithm.
How can the attacker exploit CVE-2019-19411?
An attacker who gains access to the encryption algorithm's initialization vector can exploit CVE-2019-19411 to gain unauthorized access to sensitive information.
- agent/type
- agent/softwarecombine
- collector/mitre-cve
- source/MITRE
- agent/author
- agent/references
- agent/weakness
- agent/last-modified-date
- agent/severity
- agent/description
- agent/first-publish-date
- agent/event
- agent/source
- agent/tags
- collector/nvd-index
- agent/software-canonical-lookup-request
- vendor/huawei
- canonical/huawei usg9500 firmware
- version/huawei usg9500 firmware/v500r001c30spc100
- version/huawei usg9500 firmware/v500r001c30spc200
- version/huawei usg9500 firmware/v500r001c30spc600
- version/huawei usg9500 firmware/v500r001c60spc500
- version/huawei usg9500 firmware/v500r005c00spc100
- version/huawei usg9500 firmware/v500r005c00spc200
- canonical/huawei eudemon usg9500
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203