Vulnerabilities
Vulnerable Software
There is a weak algorithm vulnerability in some Huawei products. The affected products use the RSA algorithm in the SSL key exchange algorithm which have been considered as a weak algorithm. Attackers may exploit this vulnerability to leak some information.
CVSS Score
5.3
EPSS Score
0.001
Published
2020-01-09
Some Huawei products have an insufficient verification of data authenticity vulnerability. A remote, unauthenticated attacker has to intercept specific packets between two devices, modify the packets, and send the modified packets to the peer device. Due to insufficient verification of some fields in the packets, an attacker may exploit the vulnerability to cause the target device to be abnormal.
CVSS Score
5.9
EPSS Score
0.002
Published
2019-12-13


Contact Us

Shodan ® - All rights reserved