{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T10:08:02.201","vulnerabilities":[{"cve":{"id":"CVE-2017-8135","sourceIdentifier":"psirt@huawei.com","published":"2017-11-22T19:29:02.787","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The FusionSphere OpenStack with software V100R006C00 and V100R006C10 has a command injection vulnerability due to the insufficient input validation on four TCP listening ports. An unauthenticated attacker can exploit the vulnerabilities to gain root privileges by sending some messages with malicious commands."},{"lang":"es","value":"FusionSphere OpenStack con software V100R006C00 y V100R006C10 tiene una vulnerabilidad de inyección de comandos debido a la validación de entradas insuficiente en cuatro puertos TCP en escucha. Un atacante no autenticado puede explotar las vulnerabilidades para obtener privilegios root mediante el envío de algunos mensajes con comandos maliciosos."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:C/I:C/A:C","baseScore":8.3,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":6.5,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:fusionsphere_openstack:v100r006c00:*:*:*:*:*:*:*","matchCriteriaId":"4CB1DB1F-5CAC-486C-AECF-59E9793F50AB"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:fusionsphere_openstack:v100r006c10:*:*:*:*:*:*:*","matchCriteriaId":"BD3F554A-5943-4449-9FF8-A7F7BC4E02CB"}]}]}],"references":[{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170531-01-openstack-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/102262","source":"psirt@huawei.com"},{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170531-01-openstack-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/102262","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}