CVE-2020-9213
📋 TL;DR
This CVE describes a denial-of-service vulnerability in specific Huawei network security products, where improper packet handling allows an attacker to craft malicious packets that can disrupt services. Affected systems include various Huawei NGFW, NIP, Secospace USG, and SG9500 devices in certain versions.
💻 Affected Systems
- NGFW Module
- NIP6300
- NIP6600
- NIP6800
- Secospace USG6300
- Secospace USG6500
- Secospace USG6600
- SG9500
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption or downtime for affected network security products, potentially impacting network availability and security monitoring.
Likely Case
Degraded performance or temporary service interruptions for specific services on the devices, leading to operational inefficiencies.
If Mitigated
Minimal impact if patches are applied or network controls block malicious traffic, maintaining normal service functionality.
🎯 Exploit Status
Exploitation requires sending crafted packets to vulnerable devices; no authentication is needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Huawei advisory for specific patched versions.
Vendor Advisory: https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en
Restart Required: Yes
Instructions:
1. Check the Huawei advisory for affected versions. 2. Download and apply the recommended patch from Huawei. 3. Restart the device to ensure the patch takes effect. 4. Verify the fix using version checks.
🔧 Temporary Workarounds
Network Traffic Filtering
allImplement network controls to block or rate-limit suspicious packets targeting the vulnerable devices.
Use firewall rules to filter traffic on relevant ports/protocols.
🧯 If You Can't Patch
- Isolate affected devices in a segmented network to limit exposure.
- Monitor network traffic for anomalies and implement intrusion detection systems.
🔍 How to Verify
Check if Vulnerable:
Check device version against the list in the Huawei advisory; if it matches affected versions, it is vulnerable.
Check Version:
Use Huawei device CLI commands (e.g., 'display version') to check the current software version.
Verify Fix Applied:
After patching, confirm the device version is updated to a patched version as specified by Huawei.
📡 Detection & Monitoring
Log Indicators:
- Unusual packet drops, service errors, or performance degradation logs on the device.
Network Indicators:
- Spikes in traffic to the device, especially with crafted packet patterns.
SIEM Query:
Example: 'source_ip sends high volume of packets to device_ip AND device logs service disruption'