CVE-2020-9094

7.5 HIGH

📋 TL;DR

This CVE describes an out-of-bounds read vulnerability in Huawei CloudEngine products. Attackers can exploit it by sending malicious packets, potentially causing denial of service. Organizations using affected Huawei CloudEngine versions are at risk.

💻 Affected Systems

Products:
  • Huawei CloudEngine series switches
Versions: Specific versions not detailed in CVE description; refer to Huawei advisory
Operating Systems: Huawei proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific modules handling network messages; exact configurations not specified

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash leading to extended service disruption and potential data corruption

🟠

Likely Case

Service instability or temporary denial of service requiring system restart

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring

🌐 Internet-Facing: HIGH - Attackers can send malicious packets remotely without authentication
🏢 Internal Only: MEDIUM - Internal attackers could still exploit but requires network access

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted packets to vulnerable module

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Huawei security advisory for specific patched versions

Vendor Advisory: https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201216-01-obr-en

Restart Required: Yes

Instructions:

1. Check Huawei advisory for affected versions 2. Download appropriate patch from Huawei support 3. Apply patch following Huawei documentation 4. Restart affected devices

🔧 Temporary Workarounds

Network segmentation

all

Restrict network access to CloudEngine management interfaces

Access control lists

all

Implement ACLs to filter suspicious packets

🧯 If You Can't Patch

  • Isolate affected devices in separate network segments
  • Implement strict network monitoring for anomalous packet patterns

🔍 How to Verify

Check if Vulnerable:

Check device version against Huawei advisory list of affected versions

Check Version:

display version (Huawei CLI command)

Verify Fix Applied:

Verify patch installation and confirm version is no longer in affected range

📡 Detection & Monitoring

Log Indicators:

  • System crash logs
  • Module failure messages
  • Unexpected process termination

Network Indicators:

  • Malformed packets to CloudEngine devices
  • Unusual traffic patterns to switch management interfaces

SIEM Query:

source_ip=* AND dest_ip=CloudEngine_IP AND (packet_size_anomaly OR protocol_violation)

🔗 References

📤 Share & Export