ID

VAR-200907-0114


CVE

CVE-2009-2272


TITLE

Huawei D100  Vulnerability that allows important information to be obtained in

Trust: 0.8

sources: JVNDB: JVNDB-2009-004779

DESCRIPTION

The Huawei D100 stores the administrator's account name and password in cleartext in a cookie, which allows context-dependent attackers to obtain sensitive information by (1) reading a cookie file, by (2) sniffing the network for HTTP headers, and possibly by using unspecified other vectors. D100 Router is prone to a information disclosure vulnerability. D100 is the world's first WiFi adapter that connects mobile phones, game consoles, PCs and laptops together via a WiFi link. Multiple security vulnerabilities exist in the D100 firmware and its default configuration, which may allow LAN users to gain unauthorized access to the device. #1 The web interface does not support HTTPS, an attacker can sniff the communication of the web interface. #2 The administrator's login username and password are stored in the cookie in clear text

Trust: 1.98

sources: NVD: CVE-2009-2272 // JVNDB: JVNDB-2009-004779 // BID: 79447 // VULHUB: VHN-39718

AFFECTED PRODUCTS

vendor:huaweimodel:d100scope:eqversion: -

Trust: 1.0

vendor:huaweimodel:d100 routerscope:eqversion: -

Trust: 0.8

vendor:huaweimodel:d100 routerscope: - version: -

Trust: 0.6

vendor:huaweimodel:d100 routerscope:eqversion:0

Trust: 0.3

sources: BID: 79447 // JVNDB: JVNDB-2009-004779 // CNNVD: CNNVD-200907-010 // NVD: CVE-2009-2272

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2272
value: HIGH

Trust: 1.0

NVD: CVE-2009-2272
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200907-010
value: MEDIUM

Trust: 0.6

VULHUB: VHN-39718
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-2272
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-39718
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2009-2272
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2009-2272
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-39718 // JVNDB: JVNDB-2009-004779 // CNNVD: CNNVD-200907-010 // NVD: CVE-2009-2272

PROBLEMTYPE DATA

problemtype:CWE-312

Trust: 1.0

problemtype:Plaintext storage of important information (CWE-312) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-310

Trust: 0.1

sources: VULHUB: VHN-39718 // JVNDB: JVNDB-2009-004779 // NVD: CVE-2009-2272

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200907-010

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-200907-010

PATCH

title:Top Pageurl:http://www.huawei.com/en/

Trust: 0.8

sources: JVNDB: JVNDB-2009-004779

EXTERNAL IDS

db:NVDid:CVE-2009-2272

Trust: 3.6

db:JVNDBid:JVNDB-2009-004779

Trust: 0.8

db:BUGTRAQid:20090630 MULTIPLE FLAWS IN HUAWEI D100

Trust: 0.6

db:CNNVDid:CNNVD-200907-010

Trust: 0.6

db:BIDid:79447

Trust: 0.4

db:VULHUBid:VHN-39718

Trust: 0.1

sources: VULHUB: VHN-39718 // BID: 79447 // JVNDB: JVNDB-2009-004779 // CNNVD: CNNVD-200907-010 // NVD: CVE-2009-2272

REFERENCES

url:http://www.securityfocus.com/archive/1/504645/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/archive/1/504645/100/0/threaded

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2272

Trust: 0.8

sources: VULHUB: VHN-39718 // BID: 79447 // JVNDB: JVNDB-2009-004779 // CNNVD: CNNVD-200907-010 // NVD: CVE-2009-2272

CREDITS

Filip Palian filip.palian@pjwstk.edu.pl

Trust: 0.6

sources: CNNVD: CNNVD-200907-010

SOURCES

db:VULHUBid:VHN-39718
db:BIDid:79447
db:JVNDBid:JVNDB-2009-004779
db:CNNVDid:CNNVD-200907-010
db:NVDid:CVE-2009-2272

LAST UPDATE DATE

2025-04-10T23:16:26.759000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-39718date:2018-10-10T00:00:00
db:BIDid:79447date:2009-07-01T00:00:00
db:JVNDBid:JVNDB-2009-004779date:2024-03-01T03:10:00
db:CNNVDid:CNNVD-200907-010date:2009-07-01T00:00:00
db:NVDid:CVE-2009-2272date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-39718date:2009-07-01T00:00:00
db:BIDid:79447date:2009-07-01T00:00:00
db:JVNDBid:JVNDB-2009-004779date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200907-010date:2009-06-30T00:00:00
db:NVDid:CVE-2009-2272date:2009-07-01T13:00:01.530