{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T17:19:19.688","vulnerabilities":[{"cve":{"id":"CVE-2018-7994","sourceIdentifier":"psirt@huawei.com","published":"2018-07-31T14:29:01.167","lastModified":"2024-11-21T04:13:02.963","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Some Huawei products IPS Module V500R001C50; NGFW Module V500R001C50; V500R002C10; NIP6300 V500R001C50; NIP6600 V500R001C50; NIP6800 V500R001C50; Secospace USG6600 V500R001C50; USG9500 V500R001C50 have a memory leak vulnerability. The software does not release allocated memory properly when processing Protal questionnaire. A remote attacker could send a lot questionnaires to the device, successful exploit could cause the device to reboot since running out of memory."},{"lang":"es","value":"Algunos productos Huawei IPS Module V500R001C50; NGFW Module V500R001C50; V500R002C10; NIP6300 V500R001C50; NIP6600 V500R001C50; NIP6800 V500R001C50; Secospace USG6600 V500R001C50; USG9500 V500R001C50 tienen una vulnerabilidad de filtrado de memoria. El software no libera la memoria asignada correctamente al procesar el cuestionario Protal. Un atacante remoto podría enviar muchos cuestionarios al dispositivo; su explotación con éxito podría provocar que el dispositivo se reinicie, ya que se quedaría sin memoria."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-772"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:ips_module:v500r001c50:*:*:*:*:*:*:*","matchCriteriaId":"7FD82635-8B95-498D-8AB7-1254F133B6DB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*","matchCriteriaId":"2BAD43A3-730A-4ABC-89F0-DF93A06AA60F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:ngfw_module:v500r001c50:*:*:*:*:*:*:*","matchCriteriaId":"A5314BBA-E919-45C1-BCF5-BC2D07E199CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:ngfw_module:v500r002c10:*:*:*:*:*:*:*","matchCriteriaId":"C433D71F-2631-458F-ACF3-0134D93D5C01"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*","matchCriteriaId":"547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:nip6300:v500r001c50:*:*:*:*:*:*:*","matchCriteriaId":"94B5F4E5-0508-4491-9B84-FFAE79514419"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*","matchCriteriaId":"5E054182-CE33-45E3-8595-159A75BA5162"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:nip6600:v500r001c50:*:*:*:*:*:*:*","matchCriteriaId":"4A297C6B-313D-483A-93D0-82DFD66C4FC9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*","matchCriteriaId":"CE8CA649-7AE1-497C-869B-B4DD315F342C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:nip6800:v500r001c50:*:*:*:*:*:*:*","matchCriteriaId":"8103D4D1-C933-4BF4-A0E2-F63C0A63DEAD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*","matchCriteriaId":"875441DD-575F-4F4D-A6BD-23C38641D330"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:secospace_usg6600:v500r001c50:*:*:*:*:*:*:*","matchCriteriaId":"52DEBDDA-79D1-4525-A59C-6D725B477FEB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*","matchCriteriaId":"BE469876-F873-4705-9760-097AE840A818"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:usg9500:v500r001c50:*:*:*:*:*:*:*","matchCriteriaId":"2DCD7D64-F06A-4BA5-92CF-BBD0737E031B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*","matchCriteriaId":"4B6064BB-5E62-4D70-B933-05B5426EEE9C"}]}]}],"references":[{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180704-01-firewall-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180704-01-firewall-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}