Some Huawei products RSE6500 V500R002C00; SoftCo V200R003C20SPCb00; VP9660 V600R006C10; eSpace U1981 V100R001C20; V200R003C20; V200R003C30; V200R003C50 have a weak algorithm vulnerability. To exploit the vulnerability, a remote, unauthenticated attacker has to capture TLS traffic between clients and the affected products. The attacker may launch the Bleichenbacher attack on RSA key exchange to decrypt the session key and the previously captured sessions by some cryptanalytic operations. Successful exploit may cause information leak.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
huawei rse6500_firmware v500r002c00 |
||
huawei softco_firmware v200r003c20spcb00 |
||
huawei vp9660_firmware v600r006c10 |
||
huawei espace_u1981_firmware v200r003c30 |
||
huawei espace_u1981_firmware v200r003c20 |
||
huawei espace_u1981_firmware v200r001c20 |
||
huawei espace_u1981_firmware v200r003c50 |
You don't want insecure kit from a vendor the Pentagon hates, do you?
Huawei has rolled patches to various enterprise and broadcast products to fix a cryptography bug. In late 2017 (inferred from the bug's Common Vulnerabilities and Exposures entry, CVE-2017-17174, which was reserved in December), the company discovered some products had an insecure encryption algorithm. The flaw could allow a person-in-the-middle to decrypt a session key and recover the content of the session. The products affected are: the RSE6500 recording and streaming engine (version V500R002...