{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T09:47:28.377","vulnerabilities":[{"cve":{"id":"CVE-2017-15318","sourceIdentifier":"psirt@huawei.com","published":"2017-12-22T17:29:13.267","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"RP200 V500R002C00, V600R006C00; TE30 V100R001C10, V500R002C00, V600R006C00; TE40 V500R002C00, V600R006C00; TE50 V500R002C00, V600R006C00; TE60 V100R001C10, V500R002C00, V600R006C00 have an out-of-bounds read vulnerabilities in some Huawei products. Due to insufficient input validation, a remote attacker could exploit these vulnerabilities by sending specially crafted SS7 related packets to the target devices. Successful exploit will cause out-of-bounds read and possibly crash the system."},{"lang":"es","value":"RP200 V500R002C00, V600R006C00; TE30 V100R001C10, V500R002C00, V600R006C00; TE40 V500R002C00, V600R006C00; TE50 V500R002C00, V600R006C00; TE60 V100R001C10, V500R002C00 y V600R006C00 tienen vulnerabilidades de lectura fuera de límites en algunos productos Huawei. Debido a una validación de entradas insuficiente, un atacante remoto podría explotar estas vulnerabilidades enviando paquetes relacionados con SS7 especialmente manipulados a los dispositivos objetivo. Una explotación exitosa provocaría una lectura fuera de límites y, posiblemente, el cierre inesperado del sistema."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"67731A77-1DD4-49B2-B437-2850C9583750"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*","matchCriteriaId":"98275088-2FBE-42F4-AAEC-DF02950B803D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*","matchCriteriaId":"DA3EF476-42D7-4758-8DCB-373F46BF1CF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"9DEA387B-4F45-438F-8086-6E80B553163C"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"018039EB-7265-4B71-B462-4734FD1D0503"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*","matchCriteriaId":"1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"DDD87254-ABAD-4DFF-BC0D-2CF030063D6F"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"931FD3B3-A333-4277-AE55-494F5DB9F09F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*","matchCriteriaId":"45C3AF58-E030-4E12-A2FD-A4337A5021ED"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"DF7A4D51-314B-4A77-86A7-9C5237BC4275"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"A70F8924-DC80-4D6F-BA3E-DBFE32FED788"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*","matchCriteriaId":"A4F188B3-0A63-4704-9B0D-F8DF5D973FA5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*","matchCriteriaId":"092C9FAF-8892-4E16-9C0E-BB1E3488C6C4"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"01BC9042-0485-437F-811F-F8898B3B7EA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"4A29049D-F472-4772-8750-20730DA624E9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*","matchCriteriaId":"999117E9-90C8-4E76-90B5-7D364C0B84BF"}]}]}],"references":[{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171101-01-sccpx-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171101-01-sccpx-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}