CVE-2016-8773
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
02/04/2017
Last modified:
20/04/2025
Description
Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:* | ||
| cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:s5300_firmware:v200r009c00:*:*:*:*:*:*:* | ||
| cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



