This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy
Security Advisory-SSLv3 POODLE Vulnerability in Huawei Products
- SA No:Huawei-SA-20141215-01-POODLE
- Initial Release Date:2014-12-15
- Last Release Date:2015-05-05
This Vulnerability has been assigned Common Vulnerabilities and Exposures (CVE) ID: CVE-2014-3566.
Product name |
Affected Version |
Resolved Product and Version |
AC6005 |
V200R003C00 |
V200R005C10 |
AC6605 |
V200R001C00 |
V200R005C10 |
ACU2 |
V200R005C00 |
V200R005C10 |
AP3010DN-AGN-FAT/ AP5010DN-AGN-FAT/ AP5010SN-GN-FAT/ AP6010DN-AGN-FAT/ AP6010SN-GN-FAT/ AP6510DN-AGN-FAT/ AP6610DN-AGN-FAT |
V200R003C00 |
V200R005C10 |
AP5030DN-FAT/ AP5130DN-FAT/ AP7110DN-AGN-FAT |
V200R005C00 |
V200R005C10 |
AR3200 |
V200R005C30 |
Upgrade to V200R005C32B190 |
V200R005C32 |
V200R005C32B190 |
|
BH620 V2 |
V100R002C00 |
V100R002C00SPC300 |
BH622 V2 |
V100R002C00 |
V100R002C00SPC300 |
CH121/ CH220/ CH221/ CH240/ CH242 |
V100R001C00 |
V100R001C00SPC200 |
CH140/ CH242 V3 |
V100R001C00 |
V100R001C00SPC130 |
CH222 |
V100R002C00 |
V100R002C00SPC200 |
E6000 Chassis |
V100R001C00 |
V100R001C00SPC300 |
E9000 Chassis |
V100R001C00 |
V100R001C00SPC201 |
eSight Network |
V200R003C10 |
Upgrade to V200R005C00SPC504 |
V200R005C00 |
V200R005C00SPC504 |
|
eSight UC&C |
V100R001C01 |
Upgrade to V100R001C20SPC307 |
V100R001C20 |
V100R001C20SPC307 |
|
V100R002C00 |
eSight Solution V300R002C00SPC301 |
|
eSpace Agent Desktop |
V200R001C03 |
Upgrade to eSpace CC V200R001C03SPC206B01f |
eSpace ECS |
V200R002C00 |
V200R002C00SPC202 |
eSpace U2980 |
V100R001C01 |
Upgrade to V100R001C10SPC105 |
eSpace USM |
V100R001C01 |
Upgrade to V100R001C10SPC105 |
V100R001 C10 |
V100R001C10SPC105 |
|
ManageOne SC |
V100R002C20 |
|
ManageOne |
V100R002C00/ C10/ C20 |
|
OceanStor ReplicationDirector |
V100R002C10 |
Upgrade to V100R003C00SPC400 |
V100R003C00 |
V100R003C00SPC400 |
|
RH2288 V2 |
V100R002C00 |
V100R002C00SPC300 |
RH5885 V3 |
V100R003C00/ C01 |
V100R003C00SPC105 |
S12700 |
V200R005C00 |
V200R005SPH003 |
V200R006C00 |
V200R006SPH002 |
|
S2300/2700/3300/3700 |
V100R006C05 |
V100R006SPH020 |
V100R006C03 |
||
V100R006C00 |
||
S5300/5700/6300/6700 |
V200R001C00 |
V200R001SPH018 |
V200R003C00 |
V200R003SPH011 |
|
V200R005C00 |
V200R005SPH003 |
|
S5300/5700 |
V200R006C00 |
V200R006SPH003 |
S9300/9300E/7700/9700 |
V100R006C00 |
Upgrade to V200R003C00SPC300 and V200R003SPH010 |
V200R001C00 |
V200R001SPH022 |
|
V200R003C00 |
V200R03SPH010 |
|
V200R005C00 |
V200R005SPH003 |
|
V200R006C00 |
V200R006SPH002 |
Base Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Temporal Score: 3.6 (E:F/RL:O/RC:C)
The attacker can intercept the communication packets.
2. Attacking procedure:
SSLv3 does not completely protected encrypted content and may be exploited to launch man-in-the-middle attacks on SSLv3 links. Although TLS has been widely used as an alternative, attackers can manipulate the TLS negotiation so that communication parties use SSLv3 instead of TLS. Then, attackers can exploit the vulnerability of SSLv3 to decrypt encrypted communication.
For general problems about Huawei products and solutions, please directly contact Huawei TAC (Huawei Technical Assistance Center) to request the configuration or technical assistance.
2015-03-24 V1.2 UPDATED updated list of affected products
2015-01-16 V1.1 UPDATED updated list of affected products
2014-12-15 V1.0 INITIAL