ID

VAR-201911-1957


TITLE

H3C ER5200 router has weak password vulnerability

Trust: 0.6

sources: CNVD: CNVD-2019-41059

DESCRIPTION

ER5200 is a high-performance Gigabit downlink router launched by H3C. It is mainly positioned in the SMB market of Ethernet / fiber / ADSL access and network environments such as government, enterprise organizations, and Internet cafes. There is a weak password vulnerability in Huasan ER5200 router. An attacker can use this vulnerability to log in to the management background directly.

Trust: 0.6

sources: CNVD: CNVD-2019-41059

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-41059

AFFECTED PRODUCTS

vendor:huasan communicationmodel:er5200scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-41059

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2019-41059
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2019-41059
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2019-41059

PATCH

title:H3C ER5200 router has weak password vulnerabilityurl:https://www.cnvd.org.cn/patchinfo/show/185871

Trust: 0.6

sources: CNVD: CNVD-2019-41059

EXTERNAL IDS

db:CNVDid:CNVD-2019-41059

Trust: 0.6

sources: CNVD: CNVD-2019-41059

SOURCES

db:CNVDid:CNVD-2019-41059

LAST UPDATE DATE

2022-05-04T09:09:55.976000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-41059date:2019-11-19T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-41059date:2019-11-25T00:00:00