{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T18:26:32.004","vulnerabilities":[{"cve":{"id":"CVE-2017-17283","sourceIdentifier":"psirt@huawei.com","published":"2018-02-15T16:29:02.703","lastModified":"2024-11-21T03:17:44.823","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00 have an out-of-bound read vulnerability. A remote attacker send specially crafted Session Initiation Protocol (SIP) messages to the affected products. Due to insufficient input validation, successful exploit will cause some services abnormal."},{"lang":"es","value":"Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00 y V600R006C00 tienen una vulnerabilidad de lectura fuera de límites. Un atacante remoto envía mensajes SIP (Session Initiation Protocol) especialmente manipulados a los productos afectados. Dada la validación de entradas insuficiente, una explotación con éxito podría provocar el funcionamiento erróneo de algunos servicios."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"},{"lang":"en","value":"CWE-125"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"8871106B-D3AF-4CFB-A544-1FA411642428"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*","matchCriteriaId":"7F3483B2-9EB6-4E34-900A-945C04A3160D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"67731A77-1DD4-49B2-B437-2850C9583750"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*","matchCriteriaId":"98275088-2FBE-42F4-AAEC-DF02950B803D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*","matchCriteriaId":"DA3EF476-42D7-4758-8DCB-373F46BF1CF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"9DEA387B-4F45-438F-8086-6E80B553163C"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"018039EB-7265-4B71-B462-4734FD1D0503"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*","matchCriteriaId":"1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"DDD87254-ABAD-4DFF-BC0D-2CF030063D6F"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"931FD3B3-A333-4277-AE55-494F5DB9F09F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*","matchCriteriaId":"45C3AF58-E030-4E12-A2FD-A4337A5021ED"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"DF7A4D51-314B-4A77-86A7-9C5237BC4275"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"A70F8924-DC80-4D6F-BA3E-DBFE32FED788"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*","matchCriteriaId":"A4F188B3-0A63-4704-9B0D-F8DF5D973FA5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*","matchCriteriaId":"2F6EACB9-6832-4B2A-9C5B-C1E2747D6359"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*","matchCriteriaId":"092C9FAF-8892-4E16-9C0E-BB1E3488C6C4"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*","matchCriteriaId":"01BC9042-0485-437F-811F-F8898B3B7EA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*","matchCriteriaId":"4A29049D-F472-4772-8750-20730DA624E9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*","matchCriteriaId":"999117E9-90C8-4E76-90B5-7D364C0B84BF"}]}]}],"references":[{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180207-02-sip-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180207-02-sip-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}