CVE-2020-9067
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
02/04/2020
Last modified:
03/04/2020
Description
There is a buffer overflow vulnerability in some Huawei products. The vulnerability can be exploited by an attacker to perform remote code execution on the affected products when the affected product functions as an optical line terminal (OLT). Affected product versions include:SmartAX MA5600T versions V800R013C10, V800R015C00, V800R015C10, V800R017C00, V800R017C10, V800R018C00, V800R018C10; SmartAX MA5800 versions V100R017C00, V100R017C10, V100R018C00, V100R018C10, V100R019C10; SmartAX EA5800 versions V100R018C00, V100R018C10, V100R019C10.
Impact
Base Score 3.x
8.00
Severity 3.x
HIGH
Base Score 2.0
5.20
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:huawei:smartax_ma5600t_firmware:v800r013c10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:smartax_ma5600t_firmware:v800r015c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:smartax_ma5600t_firmware:v800r015c10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:smartax_ma5600t_firmware:v800r017c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:smartax_ma5600t_firmware:v800r017c10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:smartax_ma5600t_firmware:v800r018c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:smartax_ma5600t_firmware:v800r018c10:*:*:*:*:*:*:* | ||
| cpe:2.3:h:huawei:smartax_ma5600t:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:smartax_ma5800_firmware:v100r017c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:smartax_ma5800_firmware:v100r017c10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:smartax_ma5800_firmware:v100r018c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:smartax_ma5800_firmware:v100r018c10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:smartax_ma5800_firmware:v100r019c10:*:*:*:*:*:*:* | ||
| cpe:2.3:h:huawei:smartax_ma5800:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:smartax_ea5800_firmware:v100r018c00:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



