Unknown
CVE-2020-9099
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2020-9099
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Huawei products IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 with versions of V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30 have an improper authentication vulnerability. Attackers need to perform some operations to exploit the vulnerability. Successful exploit may obtain certain permissions on the device.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- ips module firmware v500r001c00,
- ips module firmware v500r001c20,
- ips module firmware v500r001c30,
- ips module firmware v500r001c50,
- ips module firmware v500r001c60,
- ips module firmware v500r001c80,
- ips module firmware v500r005c00,
- ips module firmware v500r005c10,
- ips module firmware v500r005c20,
- ngfw module firmware v500r001c00,
- ngfw module firmware v500r001c20,
- ngfw module firmware v500r001c30,
- ngfw module firmware v500r001c50,
- ngfw module firmware v500r001c60,
- ngfw module firmware v500r002c00,
- ngfw module firmware v500r002c10,
- ngfw module firmware v500r002c20,
- ngfw module firmware v500r002c30,
- ngfw module firmware v500r005c00,
- ngfw module firmware v500r005c10,
- ngfw module firmware v500r005c20,
- nip6300 firmware v500r001c00,
- nip6300 firmware v500r001c20,
- nip6300 firmware v500r001c30,
- nip6300 firmware v500r001c50,
- nip6300 firmware v500r001c60,
- nip6300 firmware v500r001c80,
- nip6300 firmware v500r005c00,
- nip6300 firmware v500r005c10,
- nip6300 firmware v500r005c20,
- nip6600 firmware v500r001c00,
- nip6600 firmware v500r001c20,
- nip6600 firmware v500r001c30,
- nip6600 firmware v500r001c50,
- nip6600 firmware v500r001c60,
- nip6600 firmware v500r001c80,
- nip6600 firmware v500r005c00,
- nip6600 firmware v500r005c10,
- nip6600 firmware v500r005c20,
- nip6800 firmware v500r001c60,
- nip6800 firmware v500r001c80,
- nip6800 firmware v500r005c00,
- nip6800 firmware v500r005c10,
- nip6800 firmware v500r005c20,
- secospace usg6300 firmware v500r001c00,
- secospace usg6300 firmware v500r001c20,
- secospace usg6300 firmware v500r001c30,
- secospace usg6300 firmware v500r001c50,
- secospace usg6300 firmware v500r001c60,
- secospace usg6300 firmware v500r001c80,
- secospace usg6300 firmware v500r005c00,
- secospace usg6300 firmware v500r005c10,
- secospace usg6300 firmware v500r005c20,
- secospace usg6500 firmware v500r001c00,
- secospace usg6500 firmware v500r001c20,
- secospace usg6500 firmware v500r001c30,
- secospace usg6500 firmware v500r001c50,
- secospace usg6500 firmware v500r001c60,
- secospace usg6500 firmware v500r001c80,
- secospace usg6500 firmware v500r005c00,
- secospace usg6500 firmware v500r005c10,
- secospace usg6500 firmware v500r005c20,
- secospace usg6600 firmware v500r001c00,
- secospace usg6600 firmware v500r001c20,
- secospace usg6600 firmware v500r001c30,
- secospace usg6600 firmware v500r001c50,
- secospace usg6600 firmware v500r001c60,
- secospace usg6600 firmware v500r001c80,
- secospace usg6600 firmware v500r005c00,
- secospace usg6600 firmware v500r005c10,
- secospace usg6600 firmware v500r005c20,
- usg9500 firmware v500r001c00,
- usg9500 firmware v500r001c20,
- usg9500 firmware v500r001c30,
- usg9500 firmware v500r001c50,
- usg9500 firmware v500r001c60,
- usg9500 firmware v500r001c80,
- usg9500 firmware v500r005c00,
- usg9500 firmware v500r005c10,
- usg9500 firmware v500r005c20
Weaknesses
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: