Unknown
CVE-2020-9213
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2020-9213
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
There is a denial of service vulnerability in some huawei products. In specific scenarios, due to the improper handling of the packets, an attacker may craft many specific packets. Successful exploit may cause some services to be abnormal. Affected products include some versions of NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 and SG9500.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- ngfw module firmware v500r005c00,
- nip6300 firmware v500r001c30,
- nip6300 firmware v500r001c60,
- nip6300 firmware v500r005c00,
- nip6600 firmware v500r001c30,
- nip6600 firmware v500r001c60,
- nip6600 firmware v500r005c00,
- nip6800 firmware v500r001c60,
- nip6800 firmware v500r005c00,
- secospace usg6300 firmware v500r001c30,
- secospace usg6300 firmware v500r001c60,
- secospace usg6300 firmware v500r005c00,
- secospace usg6500 firmware v500r001c30,
- secospace usg6500 firmware v500r001c60,
- secospace usg6500 firmware v500r005c00,
- secospace usg6600 firmware v500r001c30,
- secospace usg6600 firmware v500r001c60,
- secospace usg6600 firmware v500r005c00,
- usg9500 firmware v500r001c30,
- usg9500 firmware v500r001c60,
- usg9500 firmware v500r005c00
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: