Vulnerabilities (CVE)

Filtered by vendor Huawei Subscribe
Filtered by product Hege-560
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-1879 1 Huawei 12 Hege-560, Hege-560 Firmware, Hege-570 and 9 more 2024-11-21 3.6 LOW 3.9 LOW
There is an improper integrity checking vulnerability on some huawei products. The software of the affected product has an improper integrity check which may allow an attacker with high privilege to make malicious modifications.Affected product versions include:HEGE-560 versions 1.0.1.21(SP3);HEGE-570 versions 1.0.1.22(SP3);OSCA-550 versions 1.0.1.21(SP3);OSCA-550A versions 1.0.1.21(SP3);OSCA-550AX versions 1.0.1.21(SP3);OSCA-550X versions 1.0.1.21(SP3).
CVE-2020-1855 1 Huawei 12 Hege-560, Hege-560 Firmware, Hege-570 and 9 more 2024-11-21 3.6 LOW 6.1 MEDIUM
Huawei HEGE-570 version 1.0.1.22(SP3); and HEGE-560, OSCA-550, OSCA-550A, OSCA-550AX, and OSCA-550X version 1.0.1.21(SP3) have an insufficient verification vulnerability. An attacker can access the device physically and exploit this vulnerability to tamper with device information. Successful exploit may cause service abnormal.
CVE-2020-1843 1 Huawei 10 Hege-560, Hege-560 Firmware, Osca-550 and 7 more 2024-11-21 4.6 MEDIUM 6.8 MEDIUM
Huawei HEGE-560 version 1.0.1.20(SP2), OSCA-550 version 1.0.0.71(SP1), OSCA-550A version 1.0.0.71(SP1), OSCA-550AX version 1.0.0.71(SP2), and OSCA-550X version 1.0.0.71(SP2) have an insufficient verification vulnerability. An attacker can perform specific operations to exploit this vulnerability by physical access methods. Successful exploitation may cause the attacker perform an illegal operation.
CVE-2020-1842 1 Huawei 10 Hege-560, Hege-560 Firmware, Osca-550 and 7 more 2024-11-21 4.6 MEDIUM 6.8 MEDIUM
Huawei HEGE-560 version 1.0.1.20(SP2); OSCA-550 and OSCA-550A version 1.0.0.71(SP1); and OSCA-550AX and OSCA-550X version 1.0.0.71(SP2) have an insufficient authentication vulnerability. An attacker can access the device physically and perform specific operations to exploit this vulnerability. Successful exploitation may cause the attacker obtain high privilege.