NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an access control bypass vulnerability. Attackers that can access to the internal network can exploit this vulnerability with careful deployment. Successful exploit may cause the access control to be bypassed, and attackers can directly access the Internet.
References
Link | Resource |
---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en | Vendor Advisory |
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 05:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en - Vendor Advisory |
Information
Published : 2020-02-28 19:15
Updated : 2024-11-21 05:11
NVD link : CVE-2020-1860
Mitre link : CVE-2020-1860
CVE.ORG link : CVE-2020-1860
JSON object : View
Products Affected
huawei
- nip6800
- secospace_usg6600
- nip6800_firmware
- secospace_usg6600_firmware
- usg9500
- usg9500_firmware
CWE