Show plain JSON{"id": "CVE-2019-5298", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.6, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 6.8, "attackVector": "PHYSICAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 0.9}]}, "published": "2019-06-04T19:29:00.587", "references": [{"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190327-01-ap-en", "tags": ["Vendor Advisory"], "source": "psirt@huawei.com"}, {"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190327-01-ap-en", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-287"}]}], "descriptions": [{"lang": "en", "value": "There is an improper authentication vulnerability in some Huawei AP products before version V200R009C00SPC800. Due to the improper implementation of authentication for the serial port, an attacker could exploit this vulnerability by connecting to the affected products and running a series of commands."}, {"lang": "es", "value": "Existe una vulnerabilidad de identificaci\u00f3n incorrecta en algunos productos de Huawei AP antes de la versi\u00f3n V200R009C00SPC800. Debido a la implementaci\u00f3n incorrecta de la identificaci\u00f3n para el puerto serie, un atacante podr\u00eda aprovechar esta vulnerabilidad al conectarse a los productos afectados y ejecutar una serie de comandos."}], "lastModified": "2024-11-21T04:44:41.857", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:huawei:ap4050dn-e_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6923D0FA-AEC5-43F6-B50F-D65633EC5498", "versionEndExcluding": "v200r009c00"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:huawei:ap4050dn-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9746576E-94D6-4866-B10E-E03FEC4DE9A5"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "psirt@huawei.com"}