| Vulnerability Name: | CVE-2015-8331 (CCN-109599) | ||||||||||||
| Assigned: | 2015-11-26 | ||||||||||||
| Published: | 2015-11-26 | ||||||||||||
| Updated: | 2016-01-11 | ||||||||||||
| Summary: | The Operation and Maintenance Unit (OMU) in Huawei VCN500 with software before V100R002C00SPC200 does not properly invalidate the session ID when an "abnormal exit" occurs, which allows remote attackers to conduct replay attacks via the session ID. | ||||||||||||
| CVSS v3 Severity: | 7.4 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) 6.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
| ||||||||||||
| Vulnerability Type: | CWE-20 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2015-8331 Source: CCN Type: Huawei-SA-20151126-01-VCN500 Replay Attack Vulnerability of Users Abnormal Exit in VCN500 Source: CONFIRM Type: Vendor Advisory http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-463067.htm Source: XF Type: UNKNOWN huawei-cve20158331-replay-attack(109599) | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||