{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T06:46:33.289","vulnerabilities":[{"cve":{"id":"CVE-2020-1858","sourceIdentifier":"psirt@huawei.com","published":"2020-02-17T20:15:11.710","lastModified":"2024-11-21T05:11:29.840","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Huawei products NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; Secospace USG6600 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100; and USG9500 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have a denial of service vulnerability. Attackers need to perform a series of operations in a special scenario to exploit this vulnerability. Successful exploit may cause the new connections can't be established, result in a denial of service."},{"lang":"es","value":"Los Productos de Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00SPC100; Secospace USG6600 versiones V500R001C30SPC600, V500R001C60SPC500 y V500R005C00SPC100; y USG9500 versiones V500R001C30SPC600, V500R001C60SPC500 y V500R005C00SPC100, presentan una vulnerabilidad de denegación de servicio. Los atacantes necesitan llevar a cabo una serie de operaciones en un escenario especial para explotar esta vulnerabilidad. Una explotación con éxito puede causar que las nuevas conexiones no puedan ser establecidas, lo que resulta en una denegación de servicio."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*","matchCriteriaId":"4B3D681F-E141-4BB1-9437-8BFE286CB164"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*","matchCriteriaId":"C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*","matchCriteriaId":"954A1F94-2442-4064-9DC5-14EFC2FA62F7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*","matchCriteriaId":"875441DD-575F-4F4D-A6BD-23C38641D330"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*","matchCriteriaId":"1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*","matchCriteriaId":"B80E521E-1BFB-405E-9F8E-4A0734731FD0"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*","matchCriteriaId":"5226BD96-2B00-469B-AADD-CD0541610BBD"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*","matchCriteriaId":"4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*","matchCriteriaId":"BE469876-F873-4705-9760-097AE840A818"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*","matchCriteriaId":"C0BF5257-8CD1-4951-9C53-07B85D468F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*","matchCriteriaId":"6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*","matchCriteriaId":"8A1EFB9D-5349-4EAF-9880-34F0D20011E4"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*","matchCriteriaId":"BE7369E3-5F3F-40D1-8690-95192131B683"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*","matchCriteriaId":"4B6064BB-5E62-4D70-B933-05B5426EEE9C"}]}]}],"references":[{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}