This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy

Security Advisory - Multiple Input Validation Vulnerabilities in CIDAM Protocol on Huawei Products

  • SA No:huawei-sa-20171220-02-cidam
  • Initial Release Date: 2017-12-20
  • Last Release Date: 2019-12-18

The CIDAM Protocol on Huawei Products has multiple input validation vulnerabilities due to insufficient validation of specific messages when the protocol is implemented. An authenticated remote attacker could send a malicious message to a target system. Successful exploit could allow the attacker to tamper with business and make the system abnormal. (Vulnerability ID: HWPSIRT-2017-08147, HWPSIRT-2017-08148, HWPSIRT-2017-08149 and HWPSIRT-2017-08150)

The four vulnerabilities have been assigned four Common Vulnerabilities and Exposures (CVE) IDs: CVE-2017-17168, CVE-2017-17169, CVE-2017-17170 and CVE-2017-17304.

Huawei has released software updates to fix these vulnerabilities. This advisory is available at the following link:

http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171220-02-cidam-en

Product Name

Affected Version

Resolved Product and Version

DP300

V500R002C00

V500R002C00SPCb00

V500R002C00B010

V500R002C00B011

V500R002C00B012

V500R002C00B013

V500R002C00B014

V500R002C00B017

V500R002C00B018

V500R002C00SPC100

V500R002C00SPC200

V500R002C00SPC300

V500R002C00SPC400

V500R002C00SPC500

V500R002C00SPC600

V500R002C00SPC800

V500R002C00SPC900

V500R002C00SPCa00

RP200

V500R002C00SPC200

Upgrade to TEX0 V600R006C00SPC500

V600R006C00

TEX0 V600R006C00SPC500

V600R006C00SPC200

V600R006C00SPC300

V600R006C00SPC400

V600R006C00SPC500

TE30

V100R001C10SPC300

Upgrade to TEX0 V600R006C00SPC500

V100R001C10SPC500

V100R001C10SPC600

V100R001C10SPC700B010

V500R002C00SPC200

V500R002C00SPC500

V500R002C00SPC600

V500R002C00SPC700

V500R002C00SPC900

V500R002C00SPCb00

V600R006C00

TEX0 V600R006C00SPC500

V600R006C00SPC200

V600R006C00SPC300

V600R006C00SPC400

V600R006C00SPC500

TE40

V500R002C00SPC600

Upgrade to TEX0 V600R006C00SPC500

V500R002C00SPC700

V500R002C00SPC900

V500R002C00SPCb00

V600R006C00

TEX0 V600R006C00SPC500

V600R006C00SPC200

V600R006C00SPC300

V600R006C00SPC400

V600R006C00SPC500

TE50

V500R002C00SPC600

Upgrade to TEX0 V600R006C00SPC500

V500R002C00SPC700

V500R002C00SPCb00

V600R006C00

TEX0 V600R006C00SPC500

V600R006C00SPC200

V600R006C00SPC300

V600R006C00SPC400

V600R006C00SPC500

TE60

V100R001C10

Upgrade to TEX0 V600R006C00SPC500

V100R001C10B001

V100R001C10B002

V100R001C10B010

V100R001C10B011

V100R001C10B012

V100R001C10B013

V100R001C10B014

V100R001C10B016

V100R001C10B017

V100R001C10B018

V100R001C10B019

V100R001C10SPC400

V100R001C10SPC500

V100R001C10SPC600

V100R001C10SPC700

V100R001C10SPC800B011

V100R001C10SPC900

V500R002C00

V500R002C00B010

V500R002C00B011

V500R002C00SPC100

V500R002C00SPC200

V500R002C00SPC300

V500R002C00SPC600

V500R002C00SPC700

V500R002C00SPC800

V500R002C00SPC900

V500R002C00SPCa00

V500R002C00SPCb00

V500R002C00SPCd00

V500R002C00SPCe00

V600R006C00

TEX0 V600R006C00SPC500

V600R006C00SPC100

V600R006C00SPC200

V600R006C00SPC300

V600R006C00SPC400

V600R006C00SPC500

eSpace U1981

V200R003C20SPC900

Upgrade to V200R003C30SPC500



Successful exploit could allow the attacker to tamper with business and make the system abnormal.

The vulnerability classification has been performed by using the CVSSv3 scoring system (http://www.first.org/cvss/specification-document).

HWPSIRT-2017-08147, HWPSIRT-2017-08148, HWPSIRT-2017-08149 and HWPSIRT-2017-08150:

Base Score: 6.5 (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H)

Temporal Score: 6.0 (E:F/RL:O/RC:C)

HWPSIRT-2017-08147, HWPSIRT-2017-08148, HWPSIRT-2017-08149 and HWPSIRT-2017-08150:

This vulnerability can be exploited only when the following conditions are present:

1. Attacker can connect to the devices.

2. The attacker must get the right of user of device.

Vulnerability details:

The CIDAM Protocol on Huawei Products has multiple input validation vulnerabilities due to insufficient validation of specific messages when the protocol is implemented. An authenticated remote attacker could send a malicious message to a target system. Successful exploit could allow the attacker to tamper with business and make the system abnormal.

Customers should contact Huawei TAC (Huawei Technical Assistance Center) to request the upgrades. For TAC contact information, please refer to Huawei worldwide website at http://www.huawei.com/en/psirt/report-vulnerabilities.

These vulnerabilities were discovered by Huawei internal tester.

2019-12-18 V1.1 UPDATED Updated the "Software Versions and Fixes" section;

2017-12-20 V1.0 INITIAL

Huawei adheres to protecting the ultimate interests of users with best efforts and the principle of responsible disclosure and deal with product security issues through our response mechanism.

To enjoy Huawei PSIRT services and obtain Huawei product vulnerability information, please visit http://www.huawei.com/en/psirt.

To report a security vulnerability in Huawei products and solutions, please send it to PSIRT@huawei.com. For details, please visit http://www.huawei.com/en/psirt/report-vulnerabilities.

This document is provided on an "AS IS" basis and does not imply any kind of guarantee or warranty, either express or implied, including the warranties of merchantability or fitness for a particular purpose. In no event shall Huawei or any of its directly or indirectly controlled subsidiaries or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. Your use of the document, by whatsoever means, will be totally at your own risk. Huawei is entitled to amend or update this document from time to time.