CVE-2021-22310
Severity CVSS v4.0:
Pending analysis
Type:
CWE-532
Information Exposure Through Log Files
Publication date:
22/03/2021
Last modified:
26/03/2021
Description
There is an information leakage vulnerability in some huawei products. Due to the properly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause an information leak. Affected product versions include: NIP6300 versions V500R001C00,V500R001C20,V500R001C30;NIP6600 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6300 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6500 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6600 versions V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80;USG9500 versions V500R005C00,V500R005C10.
Impact
Base Score 3.x
4.40
Severity 3.x
MEDIUM
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:* | ||
| cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:* | ||
| cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:* | ||
| cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



