{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T20:16:51.286","vulnerabilities":[{"cve":{"id":"CVE-2021-22365","sourceIdentifier":"psirt@huawei.com","published":"2021-06-22T18:15:08.003","lastModified":"2024-11-21T05:49:59.037","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"There is an out of bounds read vulnerability in eSE620X vESS V100R001C10SPC200, V100R001C20SPC200, V200R001C00SPC300. A local attacker can exploit this vulnerability by sending specific message to the target device. Due to insufficient validation of internal message, successful exploit may cause the process and the service abnormal."},{"lang":"es","value":"Se presenta una vulnerabilidad de lectura fuera de límites en eSE620X vESS V100R001C10SPC200, V100R001C20SPC200, V200R001C00SPC300. Un atacante local puede explotar esta vulnerabilidad mediante el envío de un mensaje específico al dispositivo de destino. Debido a la insuficiente comprobación del mensaje interno, una explotación con éxito puede causar el proceso y el servicio anormal"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":1.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:ese620x_vess_firmware:v100r001c10spc200:*:*:*:*:*:*:*","matchCriteriaId":"3D09A362-885C-4CAD-931B-ECFBB857F849"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:ese620x_vess_firmware:v100r001c20spc200:*:*:*:*:*:*:*","matchCriteriaId":"BB48C0D8-E413-411E-9565-9AABA0A70CD1"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:ese620x_vess_firmware:v200r001c00spc300:*:*:*:*:*:*:*","matchCriteriaId":"60AA30F0-E1A9-4D25-AE84-6CF952FD8E97"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:ese620x_vess:-:*:*:*:*:*:*:*","matchCriteriaId":"9AC039E0-A953-4C79-B751-5B9738371DF0"}]}]}],"references":[{"url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210526-02-outbounds-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210526-02-outbounds-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}