CVE-2021-22361

7.8 HIGH

📋 TL;DR

This CVE describes an improper authorization vulnerability in Huawei eCNS280 and eSE620X vESS products. Attackers with low-level access can exploit this to escalate privileges in specific scenarios, potentially compromising normal service operations. Organizations using affected versions of these Huawei networking products are at risk.

💻 Affected Systems

Products:
  • Huawei eCNS280
  • Huawei eSE620X vESS
Versions: eCNS280 V100R005C00, V100R005C10; eSE620X vESS V100R001C10SPC200, V100R001C20SPC200
Operating Systems: Huawei proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific Huawei networking equipment models and versions. Exploitation requires attacker to already have low-level access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to gain administrative control, disrupt critical network services, and potentially pivot to other systems.

🟠

Likely Case

Privilege escalation enabling unauthorized access to sensitive files and configuration data, potentially leading to service disruption.

🟢

If Mitigated

Limited impact with proper access controls and network segmentation, though the vulnerability still exists in the software.

🌐 Internet-Facing: MEDIUM - While exploitation requires low-level access first, internet-facing systems could be targeted as part of a multi-stage attack.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts with low privileges could exploit this to gain elevated access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires low-level access first and specific conditions. No public exploit code has been disclosed as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Huawei for specific patched versions

Vendor Advisory: https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-02-cgp-en

Restart Required: Yes

Instructions:

1. Contact Huawei support for appropriate patches. 2. Apply patches following Huawei's deployment guidelines. 3. Restart affected systems after patching. 4. Verify patch installation and system functionality.

🔧 Temporary Workarounds

Access Control Hardening

all

Implement strict access controls and least privilege principles to limit low-level access that could be leveraged for exploitation.

Network Segmentation

all

Isolate affected systems in separate network segments to limit potential lateral movement if exploited.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems
  • Enforce least privilege access controls and monitor for suspicious privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check system version against affected versions list: eCNS280 V100R005C00/C10 or eSE620X vESS V100R001C10SPC200/C20SPC200

Check Version:

Use Huawei device-specific CLI commands (varies by model) or check via management interface

Verify Fix Applied:

Verify system version has been updated to a patched version provided by Huawei support

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized file access attempts
  • Changes to user privilege levels

Network Indicators:

  • Unusual administrative access patterns
  • Traffic from low-privilege accounts accessing sensitive system areas

SIEM Query:

Search for events where low-privilege users gain administrative access or access restricted system files

🔗 References

📤 Share & Export