First published: Thu May 21 2020(Updated: )
E6878-370 with versions of 10.0.3.1(H557SP27C233), 10.0.3.1(H563SP1C00), 10.0.3.1(H563SP1C233) has a use after free vulnerability. The software references memory after it has been freed in certain scenario, the attacker does a series of crafted operations through web portal, successful exploit could cause a use after free condition which may lead to malicious code execution.
Credit: psirt@huawei.com
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei E6878-370 Firmware | =10.0.3.1\(h557sp27c233\) | |
Huawei E6878-370 Firmware | =10.0.3.1\(h563sp1c00\) | |
Huawei E6878-370 Firmware | =10.0.3.1\(h563sp1c233\) | |
Huawei E6878-370 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1799 is a use after free vulnerability in Huawei E6878-370 Firmware versions 10.0.3.1(H557SP27C233), 10.0.3.1(H563SP1C00), and 10.0.3.1(H563SP1C233).
CVE-2020-1799 allows an attacker to reference memory after it has been freed in certain scenarios through a web portal.
CVE-2020-1799 has a severity rating of 7.5 (High).
An attacker can exploit the use after free vulnerability in CVE-2020-1799 by performing a series of crafted operations through a web portal.
Yes, a fix for CVE-2020-1799 is available. Please refer to the Huawei Security Advisory for more information: [https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-uaf-en](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-uaf-en)