CVE-2012-3268
Severity CVSS v4.0:
Pending analysis
Type:
CWE-522
Insufficiently Protected Credentials
Publication date:
01/02/2013
Last modified:
11/04/2025
Description
Certain HP Access Controller, Fabric Module, Firewall, Router, Switch, and UTM Appliance products; certain HP 3Com Access Controller, Router, and Switch products; certain HP H3C Access Controller, Firewall, Router, Switch, and Switch and Route Processing Unit products; and certain Huawei Firewall/Gateway, Router, Switch, and Wireless products do not properly implement access control as defined in h3c-user.mib 2.0 and hh3c-user.mib 2.0, which allows remote authenticated users to discover credentials in UserInfoEntry values via an SNMP request with the read-only community.
Impact
Base Score 2.0
3.50
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:h:hp:0150a129:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0150a12a:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0150a12b:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0150a12c:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0231a0av:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0231a65t:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0231a761:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0231a832:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0231a86p:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0231a88a:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0231a88l:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0235a08f:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0235a08h:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0235a08k:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:hp:0235a08m:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2012-10/0123.html
- http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685
- http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301&contentId=NEWS1000001165&idAbsPath=0301_10001&nameAbsPath=Services%2520News
- http://support.huawei.com/support/pages/news/NewsInfoAction.do?doc_id=IN0000054930&colID=ROOTENWEB%7CCO0000000170&actionFlag=view
- http://www.kb.cert.org/vuls/id/225404
- http://www.kb.cert.org/vuls/id/MORO-8ZDJDP
- http://www.securityfocus.com/bid/56183
- http://www.securitytracker.com/id?1027694=
- http://archives.neohapsis.com/archives/bugtraq/2012-10/0123.html
- http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685
- http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301&contentId=NEWS1000001165&idAbsPath=0301_10001&nameAbsPath=Services%2520News
- http://support.huawei.com/support/pages/news/NewsInfoAction.do?doc_id=IN0000054930&colID=ROOTENWEB%7CCO0000000170&actionFlag=view
- http://www.kb.cert.org/vuls/id/225404
- http://www.kb.cert.org/vuls/id/MORO-8ZDJDP
- http://www.securityfocus.com/bid/56183
- http://www.securitytracker.com/id?1027694=



