CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.6 | $0-$5k | 0.00 |
A vulnerability, which was classified as problematic, was found in Huawei E5332 -/21.344.19.00.1080. This affects some unknown processing. The manipulation with an unknown input leads to a resource management vulnerability. CWE is classifying the issue as CWE-399. This is going to have an impact on availability. The summary by CVE is:
Buffer overflow in the Webserver component on the Huawei E5332 router before 21.344.27.00.1080 allows remote authenticated users to cause a denial of service (reboot) via a long parameter in an API service request message.
The weakness was presented 10/10/2014 by Shuto Imai with Chukyo Univ. as JVN#63587560 / HWPSIRT-2014-0862 as confirmed advisory (Website). The advisory is shared at jvn.jp. This vulnerability is uniquely identified as CVE-2014-5328 since 08/18/2014. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Neither technical details nor an exploit are publicly available. The advisory points out:
Huawei E5332 provided by Huawei Technologies is a mobile router. Huawei E5332 contains an issue when processing a GET request that contains an extremely long parameter, which lead to the device rebooting. An attacker that can send requests to the device may cause the device to become unresponsive.
Upgrading to version 21.344.27.00.1080 eliminates this vulnerability. The upgrade is hosted for download at consumer.huawei.com.
The vulnerability is also documented in the vulnerability database at X-Force (96949). See 67772 for similar entry.
Product
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.6
VulDB Base Score: 5.3
VulDB Temp Score: 4.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource managementCWE: CWE-399 / CWE-404
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: E5332 21.344.27.00.1080
Timeline
08/18/2014 🔍10/10/2014 🔍
10/11/2014 🔍
10/13/2014 🔍
03/08/2019 🔍
Sources
Vendor: huawei.comAdvisory: JVN#63587560 / HWPSIRT-2014-0862
Researcher: Shuto Imai
Organization: Chukyo Univ.
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-5328 (🔍)
X-Force: 96949 - Huawei E5332 denial of service, Medium Risk
See also: 🔍
Entry
Created: 10/13/2014 10:58Updated: 03/08/2019 21:25
Changes: 10/13/2014 10:58 (46), 03/08/2019 21:25 (13)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.