6.7
MEDIUM
CVE-2019-5300
Huawei Router Digital Signature Verification Bypass Vulnerability
Description

There is a digital signature verification bypass vulnerability in AR1200, AR1200-S, AR150, AR160, AR200, AR2200, AR2200-S, AR3200, SRG1300, SRG2300 and SRG3300 Huawei routers. The vulnerability is due to the affected software improperly verifying digital signatures for the software image in the affected device. A local attacker with high privilege may exploit the vulnerability to bypass integrity checks for software images and install a malicious software image on the affected device.

INFO

Published Date :

June 4, 2019, 7:29 p.m.

Last Modified :

Nov. 21, 2024, 4:44 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

0.8
Affected Products

The following products are affected by CVE-2019-5300 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Huawei ar1200_firmware
2 Huawei ar200_firmware
3 Huawei ar3200_firmware
4 Huawei ar1200-s_firmware
5 Huawei ar150_firmware
6 Huawei ar160_firmware
7 Huawei ar2200_firmware
8 Huawei srg1300_firmware
9 Huawei srg2300_firmware
10 Huawei srg3300_firmware
11 Huawei ar2200s_firmware
12 Huawei ar1200e
13 Huawei ar1220c
14 Huawei ar1220ev
15 Huawei ar1220evw
16 Huawei ar1220f-s
17 Huawei ar158evw
18 Huawei ar161
19 Huawei ar161ew
20 Huawei ar161f
21 Huawei ar161f-dgp
22 Huawei ar161fg-l
23 Huawei ar161fgw-l
24 Huawei ar161fv-1p
25 Huawei ar161fw
26 Huawei ar161g-l
27 Huawei ar161w
28 Huawei ar168f
29 Huawei ar168f-4p
30 Huawei ar169
31 Huawei ar169egw-l
32 Huawei ar169ew
33 Huawei ar169f
34 Huawei ar169fgw-l
35 Huawei ar169fvw
36 Huawei ar169fvw-8s
37 Huawei ar169g-l
38 Huawei ar169jfvw-2s
39 Huawei ar169w
40 Huawei ar201
41 Huawei ar2204-27ge
42 Huawei ar2204-27ge-p
43 Huawei ar2204-51ge-p
44 Huawei ar2204e
45 Huawei ar2204xe
46 Huawei ar2220e
47 Huawei ar2240
48 Huawei ar2240c
49 Huawei ar2200s
50 Huawei ar3260
51 Huawei srg1320vw
52 Huawei srg2320e
53 Huawei srg3340
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2019-5300.

URL Resource
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-ar-en Vendor Advisory
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-ar-en Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2019-5300 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2019-5300 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-ar-en
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Jun. 05, 2019

    Action Type Old Value New Value
    Added CVSS V2 (AV:L/AC:L/Au:N/C:P/I:P/A:P)
    Added CVSS V3 AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-ar-en No Types Assigned https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-ar-en Vendor Advisory
    Added CWE CWE-347
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar1200_firmware:v200r008c50:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar1200_firmware:v200r009c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar1200_firmware:v200r010c00:*:*:*:*:*:*:* OR cpe:2.3:h:huawei:ar1200e:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar1220c:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar1220ev:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar1220evw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c50:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar1200-s_firmware:v200r009c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar1200-s_firmware:v200r010c00:*:*:*:*:*:*:* OR cpe:2.3:h:huawei:ar1220f-s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar150_firmware:v200r008c50:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar150_firmware:v200r009c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar150_firmware:v200r010c00:*:*:*:*:*:*:* OR cpe:2.3:h:huawei:ar158evw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar160_firmware:v200r008c50:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar160_firmware:v200r009c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar160_firmware:v200r010c00:*:*:*:*:*:*:* OR cpe:2.3:h:huawei:ar161:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar161ew:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar161f:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar161f-dgp:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar161fg-l:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar161fgw-l:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar161fv-1p:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar161fw:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar161g-l:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar161w:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar168f:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar168f-4p:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar169:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar169egw-l:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar169ew:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar169f:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar169fgw-l:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar169fvw:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar169fvw-8s:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar169g-l:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar169jfvw-2s:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar169w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar200_firmware:v200r008c50:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar200_firmware:v200r009c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar200_firmware:v200r010c00:*:*:*:*:*:*:* OR cpe:2.3:h:huawei:ar201:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar2200_firmware:v200r008c50:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar2200_firmware:v200r009c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar2200_firmware:v200r010c00:*:*:*:*:*:*:* OR cpe:2.3:h:huawei:ar2204-27ge:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar2204-27ge-p:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar2204-51ge-p:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar2204e:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar2204xe:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar2220e:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar2240:-:*:*:*:*:*:*:* cpe:2.3:h:huawei:ar2240c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:ar2200s_firmware:v200r007c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar2200s_firmware:v200r008c20:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar2200s_firmware:v200r008c50:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar2200s_firmware:v200r009c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar2200s_firmware:v200r010c00:*:*:*:*:*:*:* OR cpe:2.3:h:huawei:ar2200s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar3200_firmware:v200r008c50:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar3200_firmware:v200r009c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:ar3200_firmware:v200r010c00:*:*:*:*:*:*:* OR cpe:2.3:h:huawei:ar3260:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:srg1300_firmware:v200r008c50:*:*:*:*:*:*:* *cpe:2.3:o:huawei:srg1300_firmware:v200r009c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:srg1300_firmware:v200r010c00:*:*:*:*:*:*:* OR cpe:2.3:h:huawei:srg1320vw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:srg2300_firmware:v200r008c50:*:*:*:*:*:*:* *cpe:2.3:o:huawei:srg2300_firmware:v200r009c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:srg2300_firmware:v200r010c00:*:*:*:*:*:*:* OR cpe:2.3:h:huawei:srg2320e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:srg3300_firmware:v200r008c50:*:*:*:*:*:*:* *cpe:2.3:o:huawei:srg3300_firmware:v200r009c00:*:*:*:*:*:*:* *cpe:2.3:o:huawei:srg3300_firmware:v200r010c00:*:*:*:*:*:*:* OR cpe:2.3:h:huawei:srg3340:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2019-5300 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2019-5300 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} 0.00%

score

0.05635

percentile

CVSS30 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability