First published: Tue Jun 22 2021(Updated: )
There is an out of bounds read vulnerability in eSE620X vESS V100R001C10SPC200, V100R001C20SPC200, V200R001C00SPC300. A local attacker can exploit this vulnerability by sending specific message to the target device. Due to insufficient validation of internal message, successful exploit may cause the process and the service abnormal.
Credit: psirt@huawei.com
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei Ese620x Vess Firmware | =v100r001c10spc200 | |
Huawei Ese620x Vess Firmware | =v100r001c20spc200 | |
Huawei Ese620x Vess Firmware | =v200r001c00spc300 | |
Huawei Ese620x Vess |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this out of bounds read vulnerability in eSE620X vESS is CVE-2021-22365.
CVE-2021-22365 has a severity rating of low (3.3).
A local attacker can exploit CVE-2021-22365 by sending a specific message to the target device.
The affected software for CVE-2021-22365 is eSE620X vESS firmware versions v100r001c10spc200, v100r001c20spc200, and v200r001c00spc300.
For information on available fixes for CVE-2021-22365, please refer to the Huawei Security Advisory at the provided reference link.