Total
19 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-37106 | 1 Huawei | 1 Fusioncompute | 2022-05-03 | 9.0 HIGH | 7.2 HIGH |
There is a command injection vulnerability in CMA service module of FusionCompute 6.3.0, 6.3.1, 6.5.0 and 8.0.0 when processing the default certificate file. The software constructs part of a command using external special input from users, but the software does not sufficiently validate the user input. Successful exploit could allow the attacker to inject certain commands to the system. | |||||
CVE-2021-37102 | 1 Huawei | 1 Fusioncompute | 2021-11-26 | 9.0 HIGH | 8.8 HIGH |
There is a command injection vulnerability in CMA service module of FusionCompute product when processing the default certificate file. The software constructs part of a command using external special input from users, but the software does not sufficiently validate the user input. Successful exploit could allow the attacker to inject certain commands to the system. Affected product versions include: FusionCompute 6.0.0, 6.3.0, 6.3.1, 6.5.0, 6.5.1, 8.0.0. | |||||
CVE-2021-37036 | 1 Huawei | 3 Ecns280 Td, Ecns280 Td Firmware, Fusioncompute | 2021-11-24 | 2.1 LOW | 5.5 MEDIUM |
There is an information leakage vulnerability in FusionCompute 6.5.1, eCNS280_TD V100R005C00 and V100R005C10. Due to the improperly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause the information leak. | |||||
CVE-2021-37105 | 1 Huawei | 1 Fusioncompute | 2021-10-06 | 4.3 MEDIUM | 7.5 HIGH |
There is an improper file upload control vulnerability in FusionCompute 6.5.0, 6.5.1 and 8.0.0. Due to the improper verification of file to be uploaded and does not strictly restrict the file access path, attackers may upload malicious files to the device, resulting in the service abnormal. | |||||
CVE-2020-9246 | 1 Huawei | 1 Fusioncompute | 2021-07-21 | 4.0 MEDIUM | 6.5 MEDIUM |
FusionCompute 8.0.0 has an information leak vulnerability. A module does not launch strict access control and information protection. Attackers with low privilege can get some extra information. This can lead to information leak. | |||||
CVE-2020-9228 | 1 Huawei | 1 Fusioncompute | 2021-07-21 | 5.0 MEDIUM | 7.5 HIGH |
FusionCompute 8.0.0 has an information disclosure vulnerability. Due to the properly protection of certain information, attackers may exploit this vulnerability to obtain certain information. | |||||
CVE-2020-9229 | 1 Huawei | 1 Fusioncompute | 2021-07-21 | 2.1 LOW | 4.4 MEDIUM |
FusionCompute 8.0.0 has an information disclosure vulnerability. Due to the properly protection of certain information, attackers may exploit this vulnerability to obtain certain information. | |||||
CVE-2020-9242 | 1 Huawei | 1 Fusioncompute | 2021-07-21 | 6.5 MEDIUM | 8.8 HIGH |
FusionCompute 8.0.0 have a command injection vulnerability. The software does not sufficiently validate certain parameters post from user, successful exploit could allow an authenticated attacker to launch a command injection attack. | |||||
CVE-2020-9078 | 1 Huawei | 1 Fusioncompute | 2021-07-21 | 4.6 MEDIUM | 7.8 HIGH |
FusionCompute 8.0.0 have local privilege escalation vulnerability. A local, authenticated attacker could perform specific operations to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege and compromise the service. | |||||
CVE-2020-9248 | 1 Huawei | 1 Fusioncompute | 2021-07-21 | 4.6 MEDIUM | 6.7 MEDIUM |
Huawei FusionComput 8.0.0 have an improper authorization vulnerability. A module does not verify some input correctly and authorizes files with incorrect access. Attackers can exploit this vulnerability to launch privilege escalation attack. This can compromise normal service. | |||||
CVE-2021-22358 | 1 Huawei | 1 Fusioncompute | 2021-06-04 | 4.0 MEDIUM | 4.3 MEDIUM |
There is an insufficient input validation vulnerability in FusionCompute 8.0.0. Due to the input validation is insufficient, an attacker can exploit this vulnerability to upload any files to the device. Successful exploit may cause the service abnormal. | |||||
CVE-2020-9116 | 1 Huawei | 1 Fusioncompute | 2020-12-02 | 6.5 MEDIUM | 7.2 HIGH |
Huawei FusionCompute versions 6.5.1 and 8.0.0 have a command injection vulnerability. An authenticated, remote attacker can craft specific request to exploit this vulnerability. Due to insufficient verification, this could be exploited to cause the attackers to obtain higher privilege. | |||||
CVE-2020-9114 | 1 Huawei | 1 Fusioncompute | 2020-12-02 | 7.2 HIGH | 7.8 HIGH |
FusionCompute versions 6.3.0, 6.3.1, 6.5.0, 6.5.1 and 8.0.0 have a privilege escalation vulnerability. Due to improper privilege management, an attacker with common privilege may access some specific files and get the administrator privilege in the affected products. Successful exploit will cause privilege escalation. | |||||
CVE-2020-9128 | 1 Huawei | 1 Fusioncompute | 2020-11-20 | 2.1 LOW | 4.4 MEDIUM |
FusionCompute versions 8.0.0 have an insecure encryption algorithm vulnerability. Attackers with high permissions can exploit this vulnerability to cause information leak. | |||||
CVE-2020-9233 | 1 Huawei | 1 Fusioncompute | 2020-08-21 | 6.4 MEDIUM | 9.1 CRITICAL |
FusionCompute 8.0.0 have an insufficient authentication vulnerability. An attacker may exploit the vulnerability to delete some files and cause some services abnormal. | |||||
CVE-2016-6827 | 1 Huawei | 1 Fusioncompute | 2019-10-09 | 4.0 MEDIUM | 6.5 MEDIUM |
Huawei FusionCompute before V100R005C10CP7002 stores cleartext AES keys in a file, which allows remote authenticated users to obtain sensitive information via unspecified vectors. | |||||
CVE-2017-8158 | 1 Huawei | 1 Fusioncompute | 2019-10-02 | 4.9 MEDIUM | 6.5 MEDIUM |
FusionCompute V100R005C00 and V100R005C10 have an improper authorization vulnerability due to improper permission settings for a certain file on the host machine. An authenticated attacker could create a large number of virtual machine (VM) processes to exhaust system resources. Successful exploit could make new VMs unavailable. | |||||
CVE-2016-4057 | 1 Huawei | 1 Fusioncompute | 2016-11-28 | 6.8 MEDIUM | 6.5 MEDIUM |
Huawei FusionCompute before V100R005C10SPC700 allows remote authenticated users to cause a denial of service (resource consumption) via a large number of crafted packets. | |||||
CVE-2015-8336 | 1 Huawei | 2 Fusioncompute, Fusioncompute Firmware | 2016-09-30 | 4.0 MEDIUM | 4.3 MEDIUM |
Huawei FusionCompute with software before V100R005C10SPC700 allows remote authenticated users to obtain sensitive "role and permission" information via unspecified vectors. |