Huawei XH620 V3, XH622 V3, and XH628 V3 servers with software before V100R003C00SPC610, RH1288 V3 servers with software before V100R003C00SPC613, RH2288 V3 servers with software before V100R003C00SPC617, and RH2288H V3 servers with software before V100R003C00SPC515 allow remote attackers to obtain passwords via a brute-force attack, related to lack of authentication protection mechanisms.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rh1288_v3_server_firmware | Huawei | v100r003c00 (including) | v100r003c00 (including) |
Rh2288_v3_server_firmware | Huawei | v100r003c00 (including) | v100r003c00 (including) |
Rh2288h_v3_server_firmware | Huawei | v100r003c00 (including) | v100r003c00 (including) |
Xh620_v3_server_firmware | Huawei | v100r003c00 (including) | v100r003c00 (including) |
Xh622_v3_server_firmware | Huawei | v100r003c00 (including) | v100r003c00 (including) |
Xh628_v3_server_firmware | Huawei | v100r003c00 (including) | v100r003c00 (including) |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.