{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T10:22:17.040","vulnerabilities":[{"cve":{"id":"CVE-2017-17282","sourceIdentifier":"psirt@huawei.com","published":"2018-03-09T21:29:00.627","lastModified":"2024-11-21T03:17:44.700","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SCCP (Signalling Connection Control Part) module in Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 has a buffer overflow vulnerability. An attacker has to find a way to send malformed packets to the affected products repeatedly. Due to insufficient input validation, successful exploit may cause some service abnormal."},{"lang":"es","value":"El módulo SCCP (Signalling Connection Control Part) en Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00 y V600R006C00 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante debe averiguar la forma de enviar repetidamente paquetes mal formados a los productos afectados. Dada la validación de entradas insuficiente, un exploit con éxito podría provocar el funcionamiento erróneo de algunos servicios."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":3.1,"baseSeverity":"LOW","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:M/Au:N/C:N/I:N/A:P","baseScore":2.9,"accessVector":"ADJACENT_NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":5.5,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"8871106B-D3AF-4CFB-A544-1FA411642428"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*","matchCriteriaId":"7F3483B2-9EB6-4E34-900A-945C04A3160D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"67731A77-1DD4-49B2-B437-2850C9583750"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*","matchCriteriaId":"98275088-2FBE-42F4-AAEC-DF02950B803D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*","matchCriteriaId":"DA3EF476-42D7-4758-8DCB-373F46BF1CF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"9DEA387B-4F45-438F-8086-6E80B553163C"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"018039EB-7265-4B71-B462-4734FD1D0503"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*","matchCriteriaId":"1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"DDD87254-ABAD-4DFF-BC0D-2CF030063D6F"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"931FD3B3-A333-4277-AE55-494F5DB9F09F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*","matchCriteriaId":"45C3AF58-E030-4E12-A2FD-A4337A5021ED"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"DF7A4D51-314B-4A77-86A7-9C5237BC4275"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"A70F8924-DC80-4D6F-BA3E-DBFE32FED788"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*","matchCriteriaId":"A4F188B3-0A63-4704-9B0D-F8DF5D973FA5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*","matchCriteriaId":"092C9FAF-8892-4E16-9C0E-BB1E3488C6C4"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"01BC9042-0485-437F-811F-F8898B3B7EA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"4A29049D-F472-4772-8750-20730DA624E9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*","matchCriteriaId":"999117E9-90C8-4E76-90B5-7D364C0B84BF"}]}]}],"references":[{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180228-01-sccp-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180228-01-sccp-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}