Show plain JSON{"id": "CVE-2016-5435", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 5.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 2.2}]}, "published": "2016-06-24T17:59:02.517", "references": [{"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160615-01-standby-en", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160615-01-standby-en", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-399"}]}], "descriptions": [{"lang": "en", "value": "Memory leak in Huawei IPS Module, NGFW Module, NIP6300, NIP6600, and Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 V500R001C00 before V500R001C20SPC100, when in hot standby networking where two devices are not directly connected, allows remote attackers to cause a denial of service (memory consumption and reboot) via a crafted packet."}, {"lang": "es", "value": "Fuga de memoria en Huawei IPS Module, NGFW Module, NIP6300, NIP6600 y Secospace USG6300, USG6500, USG6600, USG9500 y AntiDDoS8000 V500R001C00 en versiones anteriores a V500R001C20SPC100, cuando en redes de espera activa donde dos dispositivos no est\u00e1n conectados directamente, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y reinicio) a trav\u00e9s de un paquete manipulado."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:huawei:huawei_firmware:v5500r001c00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9844F49B-7B71-40C4-BFAA-8DC6E15476F7"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F"}, {"criteria": "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4"}, {"criteria": "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5E054182-CE33-45E3-8595-159A75BA5162"}, {"criteria": "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CE8CA649-7AE1-497C-869B-B4DD315F342C"}, {"criteria": "cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5EE75ACF-D29C-4846-932D-FB9C84E1D35F"}, {"criteria": "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C281B511-7A27-4FC6-9427-AE5AD7C302F3"}, {"criteria": "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0"}, {"criteria": "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BE469876-F873-4705-9760-097AE840A818"}, {"criteria": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4B6064BB-5E62-4D70-B933-05B5426EEE9C"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}