{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T09:13:41.411","vulnerabilities":[{"cve":{"id":"CVE-2016-4577","sourceIdentifier":"cve@mitre.org","published":"2016-05-23T19:59:11.197","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\""},{"lang":"es","value":"Desbordamiento de buffer en la funcionalidad Smart DNS en los firewalls Huawei NGFW Module y Secospace USG6300, USG6500, USG6600 y USG9500 con software anterior a V500R001C20SPC100 permite a atacantes remotos provocar una denegación de servicio o ejecutar código arbitrario a través de un paquete manipulado, relacionado con \"parámetros ilegítimos\"."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.8,"accessVector":"ADJACENT_NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.2,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*","matchCriteriaId":"4B6064BB-5E62-4D70-B933-05B5426EEE9C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*","matchCriteriaId":"22007E6A-68FC-4AF4-A570-95873AFBF882"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*","matchCriteriaId":"547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*","matchCriteriaId":"80411236-6B22-4937-87F3-E06C991B14D6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*","matchCriteriaId":"C281B511-7A27-4FC6-9427-AE5AD7C302F3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*","matchCriteriaId":"4C996915-83A1-4EA5-A8E1-F609DA879D2D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*","matchCriteriaId":"BE469876-F873-4705-9760-097AE840A818"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*","matchCriteriaId":"E990766D-FBD4-404E-A783-3D2D0BC210F3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*","matchCriteriaId":"0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*","matchCriteriaId":"3189382E-6846-4713-A92F-ABD03683F4A5"}]}]}],"references":[{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/90532","source":"cve@mitre.org"},{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/90532","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}