Vulnerabilities > CVE-2014-3221 - Resource Management Errors vulnerability in Huawei Eudemon8000E Firmware V200R001C01Spc800
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
Huawei Eudemon8000E firewall with software V200R001C01SPC800 and earlier versions allows users to log in to the device using Telnet or SSH. When an attacker sends to the device a mass of TCP packets with special structure, the logging process becomes slow and users may be unable to log in to the device.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 | |
Hardware | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Huawei Local Security Checks |
NASL id | HUAWEI-SA-20140127-01.NASL |
description | The remote host is a Huawei switch running a firmware version that is affected by a denial of service vulnerability. A remote, unauthenticated attacker could exploit this vulnerability by sending a large amount of TCP packets to the device, preventing legitimate users from logging in via SSH or Telnet. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 77338 |
published | 2014-08-22 |
reporter | This script is Copyright (C) 2014 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/77338 |
title | Huawei Eudemon8000E Firewall DoS (HWPSIRT-2014-0101) |
code |
|