{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T13:44:34.708","vulnerabilities":[{"cve":{"id":"CVE-2020-1837","sourceIdentifier":"psirt@huawei.com","published":"2020-07-06T18:15:20.403","lastModified":"2024-11-21T05:11:27.943","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ChangXiang 8 Plus with versions earlier than 9.1.0.136(C00E121R1P6T8) have a denial of service vulnerability. The device does not properly handle certain message from base station, the attacker could craft a fake base station to launch the attack. Successful exploit could cause a denial of signal service condition."},{"lang":"es","value":"ChangXiang 8 Plus con versiones anteriores a 9.1.0.136(C00E121R1P6T8), presenta una vulnerabilidad de denegación de servicio. El dispositivo no maneja apropiadamente determinados mensajes de una estación base, un atacante podría diseñar una estación base falsa para iniciar el ataque. Una explotación con éxito podría causar una condición de denegación de servicio de señal"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:M/Au:N/C:N/I:N/A:P","baseScore":2.9,"accessVector":"ADJACENT_NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":5.5,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:changxiang_8_plus_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"9.1.0.136\\(c00e121r1p6t8\\)","matchCriteriaId":"6BB80081-C4C8-453E-BD15-27491374116C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:changxiang_8_plus:-:*:*:*:*:*:*:*","matchCriteriaId":"ED01DFA5-3411-4D0D-B41D-9D6E3AD620FB"}]}]}],"references":[{"url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200624-01-dos-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200624-01-dos-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}