This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy

Security Notice-Response to Kurt Grutzmacher’s finding for potential Huawei product vulnerability

  • Initial Release Date: 2012-12-21
  • Last Release Date: 2012-12-21

On Oct. 19, Huawei PSIRT noticed the media report titled “Demo of "serious" networking vulnerabilities cancelled at HP's request-Saturday's Toorcon talk was to discuss risks posed by gear from H3C and Huawei” . Huawei PSIRT responded immediately and proactively coordinate Kurt Grutzmacher, US-CERT, CERT/CC and CNCERT to handle the issue. On Oct. 24, Huawei PSIRT finally acquired the technical details of the vulnerabilities from the public channel of US-CERT and launched shortly the vulnerability analysis and investigation to develop the mitigation measures. The first version of “SNMP vulnerability on Huawei multiple products” SA was released on Oct. 25. The investigation is still ongoing. Huawei PSIRT will keep updating the SA. Please refer to the above link.

 

Huawei adheres to protecting the ultimate interest of product users with best efforts and the principle of responsible disclosure. Here, we also express our appreciation for Kurt Grutzmacher’s concerns on Huawei products


2012-12-21 V1.0 INITIAL

Huawei adheres to protecting the ultimate interests of users with best efforts and the principle of responsible disclosure and deal with product security issues through our response mechanism. Please report to Huawei PSIRT at psirt@huawei.com if you find any security vulnerability of Huawei products.