{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T20:20:14.077","vulnerabilities":[{"cve":{"id":"CVE-2017-17174","sourceIdentifier":"psirt@huawei.com","published":"2018-07-31T14:29:00.247","lastModified":"2024-11-21T03:17:38.853","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Some Huawei products RSE6500 V500R002C00; SoftCo V200R003C20SPCb00; VP9660 V600R006C10; eSpace U1981 V100R001C20; V200R003C20; V200R003C30; V200R003C50 have a weak algorithm vulnerability. To exploit the vulnerability, a remote, unauthenticated attacker has to capture TLS traffic between clients and the affected products. The attacker may launch the Bleichenbacher attack on RSA key exchange to decrypt the session key and the previously captured sessions by some cryptanalytic operations. Successful exploit may cause information leak."},{"lang":"es","value":"Algunos productos Huawei RSE6500 V500R002C00; SoftCo V200R003C20SPCb00; VP9660 V600R006C10; eSpace U1981 V100R001C20; V200R003C20; V200R003C30 y V200R003C50 tienen una vulnerabilidad de algoritmo débil. Para explotar esta vulnerabilidad, un atacante no autenticado remoto debe capturar tráfico TLS entre los clientes y los productos afectados. El atacante podría iniciar un ataque Bleichenbacher en el intercambio de claves RSA para descifrar la clave de sesión y las sesiones previamente capturadas por medio de operaciones de criptoanálisis. Un exploit con éxito podría provocar un filtrado de información."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-310"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"649BB696-BDBE-46FC-A23D-287DE306D8BB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*","matchCriteriaId":"4DD9417D-0515-4B21-AD32-E6B137575D01"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:softco_firmware:v200r003c20spcb00:*:*:*:*:*:*:*","matchCriteriaId":"8CCA190A-D381-4139-B2A6-28B19A534C75"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*","matchCriteriaId":"CB0BB461-988A-4E55-BEFC-C5BB8245E751"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:vp9660_firmware:v600r006c10:*:*:*:*:*:*:*","matchCriteriaId":"8D888F94-B0D9-4CFF-8A29-7F1720B5BEDA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*","matchCriteriaId":"D1DC498B-F19F-403A-ACFE-F8364A78EC66"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:espace_u1981_firmware:v200r001c20:*:*:*:*:*:*:*","matchCriteriaId":"CDC5311E-194E-4891-B762-8FC1EAA27E72"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*","matchCriteriaId":"C82BCBDF-4F07-47F1-BB91-6148E2403133"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*","matchCriteriaId":"FC865317-D874-469D-AE84-7700B0F1485C"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c50:*:*:*:*:*:*:*","matchCriteriaId":"21E676EE-B0B5-4177-8676-2936DE259C39"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*","matchCriteriaId":"C7BD4D80-D901-4082-B74D-A1D0CC24CA9F"}]}]}],"references":[{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180703-01-algorithm-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180703-01-algorithm-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}