Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-17165

EPSS 0.20% · P42
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-17165

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
IPv6 function in Huawei Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00 has an out-of-bounds read vulnerability. An unauthenticated attacker may send crafted malformed IPv6 packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause device to reset.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Huawei产品缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Huawei Quidway S2700等都是中国华为(Huawei)公司的S系列交换机产品。 多款Huawei产品中的IPv6协议存在越边界读取漏洞,该漏洞源于程序对报文缺乏校验。攻击者可通过向设备发送恶意的IPv6报文利用该漏洞造成设备重启。以下产品和版本受到影响:Huawei Quidway S2700 V200R003C00SPC300版本;Quidway S5300 V200R003C00SPC300版本;Quidway S5700 V200R003C00SPC300版本;S2300 V200R
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Huawei Technologies Co., Ltd.Quidway S2700,Quidway S5300,Quidway S5700,S2300,S2700,S5300,S5700,S600-E,S6300,S6700 Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R00 -

II. Public POCs for CVE-2017-17165

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-17165

登录查看更多情报信息。

Same Patch Batch · Huawei Technologies Co., Ltd. · 2018-02-15 · 71 CVEs total

CVE-2017-17185多款Huawei产品缓冲区错误漏洞
CVE-2017-17298多款Huawei产品缓冲区错误漏洞
CVE-2017-17296多款Huawei产品安全漏洞
CVE-2017-17285Huawei LON-AL00B Bluetooth模块缓冲区错误漏洞
CVE-2017-17284多款Huawei产品SIP模块资源管理错误漏洞
CVE-2017-17283多款Huawei产品SIP模块资源管理错误漏洞
CVE-2017-17202多款Huawei产品缓冲区错误漏洞
CVE-2017-17201多款Huawei产品安全漏洞
CVE-2017-17187多款Huawei产品数字错误漏洞
CVE-2017-17186多款Huawei产品安全漏洞
CVE-2017-17286多款Huawei产品缓冲区错误漏洞
CVE-2017-17184多款Huawei产品数字错误漏洞
CVE-2017-17183多款Huawei产品数字错误漏洞
CVE-2017-17182多款Huawei产品缓冲区错误漏洞
CVE-2017-17166多款Huawei产品安全漏洞
CVE-2017-17164Huawei Secospace AntiDDoS8000 安全漏洞
CVE-2017-17163Huawei Secospace USG6600 安全漏洞
CVE-2017-17162Huawei Secospace USG6600和USG9500 安全漏洞
CVE-2017-17161Huawei Duke-L09 安全漏洞
CVE-2017-17160多款Huawei产品缓冲区错误漏洞

Showing top 20 of 71 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-17165

No comments yet


Leave a comment