CVE-2021-22299

7.8 HIGH

📋 TL;DR

This is a local privilege escalation vulnerability in Huawei ManageOne, NFV_FusionSphere, SMC2.0, and iMaster MAE-M products. An authenticated local attacker can execute crafted commands to gain higher privileges on affected systems. The vulnerability affects specific versions of these Huawei enterprise products.

💻 Affected Systems

Products:
  • Huawei ManageOne
  • Huawei NFV_FusionSphere
  • Huawei SMC2.0
  • Huawei iMaster MAE-M
Versions: ManageOne: 6.5.0 to 8.0.1; NFV_FusionSphere: 6.5.1.SPC23, 8.0.0.SPC12; SMC2.0: V600R019C00, V600R019C10; iMaster MAE-M: MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220
Operating Systems: Linux-based Huawei EulerOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access to the affected Huawei products.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains root/administrator privileges, enabling complete system compromise, data theft, lateral movement, and persistence.

🟠

Likely Case

Malicious insider or compromised low-privilege account escalates to administrative privileges for unauthorized access and control.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated systems with minimal data exposure.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access to the system.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and specific command crafting. No public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to versions beyond those listed in affected versions. Contact Huawei for specific patched versions.

Vendor Advisory: https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en

Restart Required: Yes

Instructions:

1. Check current version using Huawei product management interface. 2. Download appropriate patches from Huawei support portal. 3. Apply patches following Huawei's update procedures. 4. Restart affected services/systems as required.

🔧 Temporary Workarounds

Restrict Local Access

linux

Limit local shell/command access to trusted administrators only.

# Configure access controls via Huawei management interface
# Use role-based access control to restrict command execution

Monitor Command Execution

linux

Implement auditing of privileged command execution on affected systems.

# Configure auditd or Huawei monitoring tools
# Set up alerts for unusual privilege escalation attempts

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles for all user accounts.
  • Deploy host-based intrusion detection and monitor for privilege escalation attempts.

🔍 How to Verify

Check if Vulnerable:

Check Huawei product version against affected version list in vendor advisory.

Check Version:

# Use Huawei product-specific CLI or web interface to check version

Verify Fix Applied:

Verify version is updated beyond affected versions and test privilege escalation attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events
  • Suspicious command execution by non-admin users
  • Failed authentication attempts followed by successful privilege changes

Network Indicators:

  • N/A - Local vulnerability

SIEM Query:

source="huawei_product" AND (event_type="privilege_escalation" OR command="sudo" OR command="su")

🔗 References

📤 Share & Export