Huawei OceanStor 5300 V3, 5500 V3, 5600 V3, 5800 V3, 6800 V3, 18800 V3, and 18500 V3 before V300R003C10 sends the plaintext session token in the HTTP header, which allows remote attackers to conduct replay attacks and obtain sensitive information by sniffing the network.
References
Link | Resource |
---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160615-01-oceanstor-en | Vendor Advisory |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160615-01-oceanstor-en | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 02:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160615-01-oceanstor-en - Vendor Advisory |
Information
Published : 2016-06-24 17:59
Updated : 2024-11-21 02:54
NVD link : CVE-2016-5722
Mitre link : CVE-2016-5722
CVE.ORG link : CVE-2016-5722
JSON object : View
Products Affected
huawei
- ocean_stor_5500_v3
- ocean_stor_6800_v3
- ocean_stor_5300_v3
- ocean_stor_5800_v3
- ocean_stor_18500_v3
- ocean_stor_firmware
- ocean_stor_18800_v3
- ocean_stor_5600_v3
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor