Este site utiliza cookies. Ao continuar navegando no site, você concorda com esse uso. Leia nossa política de privacidade

Security Notice-Statement on CERT Revealing Security Vulnerabilities in OSPF Protocol

  • Initial Release Date: 2013-10-10
  • Last Release Date: 2013-10-10

Huawei was notified about information released by CERT regarding security vulnerability in Open Shortest Path First (OSPF) protocol of routers provided by multiple vendors in early August, 2013. Huawei immediately launched a thorough investigation and communicated with CERT.

In routers of multiple vendors, OSPF Protocol does not specify unique Link State Advertisement (LSA) lookup identifiers, which allow an attacker to intercept traffic or conduct a Denial of Service (DoS) attack. According to the investigation undertaken by Huawei PSIRT, it can be concluded that none of Huawei products is vulnerable to this issue.

Huawei has notified CERT to modify the related information. The vulnerability status of Huawei in the “Vendor Information” section on CERT website is “Not Affected” at present. 

2013-10-10 V1.0 INITIAL

Huawei adheres to protecting the ultimate interests of users with best efforts and the principle of responsible disclosure and deal with product security issues through our response mechanism. Please report to Huawei PSIRT at psirt@huawei.com if you find any security vulnerability of Huawei products.