News Start Security Advisory-OpenSSL Heartbeat Extension vulnerability (Heartbleed bug) on Huawei multiple products SA No: Huawei-SA-20140417-Heartbleed Initial Release Date: 04-17-2014 Last Release Date: 05-12-2014 Summary Some OpenSSL software versions used in multiple Huawei products have the following OpenSSL vulnerability. Unauthorized remote attackers can dump 64 Kbytes of memory of the connected server or client in each attack. The leaked memory may contain sensitive information, such as passwords and private keys (Vulnerability ID: HWPSIRT-2014-0414). This Vulnerability has been assigned Common Vulnerabilities and Exposures (CVE) ID: CVE-2014-0160. Impact The impacts of this vulnerability on Huawei products vary with products. Attackers may exploit this vulnerability to dump a certain size of memory of devices. The leaked memory may contain sensitive information, such as passwords and private keys. Vulnerability Scoring Details The vulnerability classification has been performed by using the CVSSv2 scoring system (http://www.first.org/cvss/). Base Score: 5.0 (AV:N/AC:L/AU:N/C:P/I:N/A:N) Temporal Score: 4.5 (E:P/RL:U/RC:C) Technique Details 1. Prerequisite: This vulnerability can be exploited only when the following conditions are present: The attacker is able to locally or remotely access the device affected by the vulnerability. 2. Vulnerability details: The vulnerability is due to a missing memory bounds check when the OpenSSL software processes TLS heartbeat packets. Attackers can trigger the vulnerability by sending malformed TLS heartbeat packets to the server. The attacker may also impersonate a server to send malicious packets to a client that accesses the server to attack the client. After the attack succeeds, the attacker can dump a certain size of memory each time the attacker sends a malicious heartbeat packet. The dumped memory may contain sensitive information, such as passwords and private keys. Temporary Fix Null Software Versions and Fixes Product Name Affected Version Solved Plan/Patch Link AHR V100R003C00SPC350 and later versions V100R003C00SPC360 BCM BCM V300R003C01 BCM V300R003C30 CCE3.0 CCE V100R003C00 V300R003C30LG0106 SPC002 V300R003C50SPC020 BCM V300R003C30LG0106 SPC002 BCM V300R003C50SPC020 BICP V100R001C50LS0002 BCM V300R003C30LG0106 SPC002 BCM V300R003C50SPC020 V100R003C00CP1301 CPS CPS V100R001C10 CPS V100R001C20 BICP V100R001C50LS0002 Billing V5R5 CBS V500R005C21 CBS CBS V300R003C01 CBS V100R002C02 CRM CSP CTI DWH IDC Solution CC&BM V100R002C61 CC&BM V100R002C62 CC&BM V100R002C72 Wimax BOSS V100R001C01 V600R005C10 V600R005C11SPC100 V300R005C50 V300R006C30 V100R002C10 V100R002C30 V100R001C01 V100R001C03 BCM V300R003C30LG0106 SPC002 BCM V300R003C50SPC020 BICP V100R001C50LS0002 V600R003C90LG1032 V300R005C50SPC011 BICP V100R001C50LS0002 Tecal RH2288 V2 V100R002C00SPC115 Tecal RH2285 V2 V100R002C00SPC113 Tecal E6000 Chassis V100R001C00SPC111 Tecal BH622 V2 V100R002C00SPC108 Tecal BH640 V2 V100R002C00SPC107 Tecal BH640 V2 V100R002C00SPC107 Tecal RH2285 V2 V100R002C00SPC113 Tecal RH2288 V2 V100R002C00SPC115 Tecal RH2485 V2 V100R002C00SPC501 Tecal RH5885 V2 V100R001C02SPC109 Tecal XH310 V2 V100R001C00SPC107 Tecal XH311 V2 V100R001C00SPC107 Tecal XH320 V2 V100R001C00SPC109 Tecal XH621 V2 V100R001C00SPC105 Tecal RH1288 V2 eBIMS V100R001C00SPC100 V100R002C00SPC105 Tecal DH310 V2 V100R001C00SPC107 Tecal DH620 V2 V100R001C00SPC105 Tecal DH621 V2 V100R001C00SPC105 Tecal E6000 Chassis V100R001C00SPC111 Tecal BH622 V2 V100R002C00SPC108 Tecal BH640 V2 V100R002C00SPC107 CSB Solution V100R001C01SPC101 V100R001C00SPC200 ECC500 V600R001C00 V6R1C00SPC100 EDC Solution V100R001C01 eLTE Broadband eSight V300R001C10 Tecal E6000 Chassis V100R001C00SPC111 Tecal BH622 V2 V100R002C00SPC108 Tecal BH640 V2 V100R002C00SPC107 V300R001C10CP2004 Access eCNS600 V100R001C00 eCNS600 V100R002C00 V100R002C00SPC300 V100R002C00SPC300 eSDK Solution V100R002C01 eSight eSpace desktop V200R003C00 V200R003C01 V200R003C10 V100R001C01 V100R001C02 V200R001 eSpace Meeting V100R001C00 V100R001C00SPC302 V100R001C02 V100R001C02SPC102 eSight UC&C eSDK IVS V100R003C10SPC100 eSDK UC V100R003C10SPC001 V200R003C01SPC204 V200R003C10SPC104 V100R001C20SPH303 V100R001C01SPH301 V200R001C03SPC800 Portal eSpace IVS eSpace UC V200R001C50 EVC3.3 EVC V300R003C02 FusionCloud Desktop Solution Fusioncube V200R001C50SPC003 T BICP V100R001C50LS0002 V100R003C00 Tecal RH2285 V2 V100R002C00SPC113 V100R002C00 Tecal RH2288 V2 V100R002C00SPC115 V100R002C01 Tecal E9000 Chassis V100R001C00SPC160 V900R008C20SPC508 FusionSphere V100R003C00 HSS9860 HSS9860 V900R008C20 HyperDP OceanStor N8500V200R001C09 OceanStor N8500 V200R001C91 V300R001C11/C12/C31/C32 V200R001C09SPC500 V200R013C00CP2302 IMS iManager M2000 V200R013C00SPC230 iManager M2000 V200R013C00HP2301 iManager PRS V100R014C00SPC100 iManager U2000 V100R009C00SPC300 iManager U2000 V200R014C00SPC100 iManager U2000 V200R014C00SPC110 IMS V200R010C00 ISOP V200R001C00 LMT of GGSN9811/ GGSN9811 V900R008C01 UGW9811 V900R001C03 UGW9811 V900R001C05 UGW9811 V900R009C01 UGW9811 V900R009C02 UGW9811 V900R010C00 UGW9811 V900R010C01 UGW9811 V900R010C72 UGW9811 V900R010C81 IDS2000 iManager M2000 iManager PRS iManager U2000 iManager U2000-M UGW9811/ PDSN9660/ WASN9770/ HA9661 V200R001C91SPC200 ECC500 V3R1C30 V100R014C00CP1501 V100R009C00CP3002 V200R014C00SPC200 CGP V100R006C60SPC609 BICP V100R001C50LS0002 UGW9811 V900R009C01SPC300 UGW9811 V900R009C02SPC200 UGW9811 V900R010C00SPC100 UGW9811 V900R010C01SPC200 UGW9811 HA9661 V900R007C06 PDSN9660 V900R007C02 PDSN9660 V900R007C03 PDSN9660 V900R007C05 PDSN9660 V900R007C06 WASN9770 V300R003C01 WASN9770 V300R003C02 Mediation Mediation V100R002C20 Mediation V100R002C30 Mobile phone Y300 Y300-0100 V100R001C00B197 Mobile phone G510 G510-0200 V100R001C00B193 Mobile phone V900R010C72SPC200 UGW9811 V900R010C81SPC100 HA9661 V900R007C06SPC300 PDSN9660 V900R007C06SPC200 WASN9770 V300R003C02SPC300 BCM V300R003C30LG0106 SPC002 BCM V300R003C50SPC020 In the TA ( technical accept) testing Released V100R001C85B177/B187 In the TA ( technical accept) testing V100R001C92B173 In the TA ( technical accept) testing MSOFTX3000 MSOFTX3000 V200R010C10 V200R010C10SPH103 Nastar GENEX Nastar V600R014C00SPC201T GENEX Nastar V600R014C00 V100R001C10/C20/C30 U8686 Mobile phone C8813 NetCol ACC NGIN OCS OIC SNE V300R002C20 SNE V300R002C30 SNE V300R002C40 SNE V300R002C50 BMP V100R002C30 BMP V100R002C40 OCS V100R002C01 OCS V300R003C01 V100R001C00SPC300 V600R014C00CP0010 V100R001C10 V300R002C50 V100R002C40SPC001 BCM V300R003C30LG0106 SPC002 BICP V100R001C50LS0002 BCM V300R003C50SPC020 V100R001C00SPC401 V100R001C00SPC400 OnlineMediation OnlineMediationV300R003C01 OnlineMediationV300R003C02 OnlineMediationV300R003C21 ONIP SNE V300R002C50 BICP V100R001C50LS0002 OnlineMediationV300R003C30 V300R001C60SPC001 V300R001C60SPC002 V300R002C03SPC600 PDU8000 PowerCube1000 V300R002C03 PowerCube Controller Software V300R002C00/C10/C20C/C30 V100R002C00 Policy Center V100R003C00 V100R003C00SPC303 PRM PRM V300R001C08 PRM V300R001C20 RCS9880 SAG V100R002C10 V100R003C00 V200R001C38 BCM V300R003C30LG0106 SPC002 BCM V300R003C50SPC020 V100R002C10CP0001 V100R003C00CP0001 V200R001C38LG0005 SANEX V100R002C00 V100R002C00SPC002 Smart Campaign V300R003C02 OpenEye CMS PCCS V100R002C00SPC100 SOFTX3000 V600R012C10 BICP V100R001C50LS0002 SUM V300R002C02SPC73 SUM V300R002C20SPC74 V600R012C10SPC203 SPS V300R007C00 V300R007C00SPH103 STB V100R002C15LLNL72 V100R002C15LSCD81 V100R001C06LCOE01SPC200 IPTV STB V100R002C15LSCD67 IPTV STB V100R002C15LLNL75 Terminal Middleware V100R001C06LCOE02 SPC200 Tecal E6000 Chassis V100R001C00SPC111 Tecal BH622 V2 SMU02B SMU Tecal E6000 V300R002C02 V300R002C10 V100R002 Tecal RH1288 V2 V100R002C00 V100R002C00SPC108 Tecal BH640 V2 V100R002C00SPC107 Tecal E6000 Chassis V100R001C00SPC111 Tecal BH622 V2 V100R002C00SPC108 Tecal BH640 V2 V100R002C00SPC107 Tecal E9000 Chassis V100R001C00SPC160 Tecal CH121 V100R001C00SPC150 Tecal CH140 V100R001C00SPC100 Tecal CH220 V100R001C00SPC150 Tecal CH221 V100R001C00SPC150 Tecal CH222 V100R002C00SPC150 Tecal CH240 V100R001C00SPC150 Tecal CH242 V100R001C00SPC150 Tecal CH242 V3 V100R001C00SPC100 V100R002C00SPC105 Tecal RH2285 V2 V100R002C00 V100R002C00SPC113 Tecal RH2285H V2 V100R002C00 V100R002C00SPC108 Tecal RH2288 V2 V100R002C00 V100R002C00SPC115 Tecal RH2288H V2 V100R002C00 V100R002C00SPC110 Tecal RH2485 V2 V100R002 V100R002C00SPC501 Tecal RH5885 V2 V100R001 V100R003 V100R001C02SPC109 Tecal RH5885 V3 V100R003 V100R003C01SPC101 Tecal RH5885H V3 V100R003 V100R003C00SPC101 Tecal X6000 V100R002 Tecal XH310 V2 V100R001C00SPC107 Tecal XH311 V2 Tecal E6000 V100R001C00 Chassis Tecal E9000 V100R001 Chassis Tecal X8000 WebLMT of BSC6900 WebLMT of BSC6910 V100R001 BSC6900 V100R016C00 V100R016C00SPC600 BSC6910 V100R016C00 V100R009C00SPC100 WebLMT of eGBTS/NODEB/MB V100R001C00SPC107 Tecal XH320 V2 V100R001C00SPC109 Tecal XH621 V2 V100R001C00SPC105 Tecal DH310 V2 V100R001C00SPC107 Tecal DH620 V2 V100R001C00SPC105 Tecal DH621 V2 V100R001C00SPC105 V100R016C00SPC600 BTS3900 V100R009C00 TS BTS3900 V100R009C00 V100R009C00SPC100 BTS3900 V100R009C00 V100R009C00SPC100 V200R001C00 V200R001C00SPC131 V100R001C01 V100R001C01SPC292 UAC3000 V100R003C00 UGC3200 UGC3200 V200R010C00 UPCC UPCC V300R006C01 UPCC V300R006C02 V1R1C00/C10/C11/C30/C31 CGP V100R006C60SPC609 CGP V100R006C60SPC609 V300R006C01SPC203 V300R006C02SPC105 V100R001C10SPC401 WebLMT of eNodeb(FDD) WebLMT of eNodeb(TDD) WFM UPS2000 V100R002C01SPC300 V100R001C10SPC600 USN9810 V100R001C00/C01/C10/C02 V100R002C00/C01/C02/C03 V100R002C10/C11/C12/C13 V900R012C01 VGS SCG V500R005C30 V500R005C30LG0001 UPS5000 V900R012C01SPH003 Obtaining Fixed Software Customers should contact Huawei TAC (Huawei Technical Assistance Center) to request the upgrades, or obtain them through Huawei worldwide website at http://support.huawei.com/support/. For TAC contact information, please refer to the following links: TAC for Carrier Customers: http://support.huawei.com/support/pages/news/NewsInfoAction.do?actionFlag=view&doc_id=IN 0000034614&colID=ROOTENWEB%7CCO0000000169%7CCO0000003000. TAC for enterprise customers: http://support.huawei.com/enterprise/NewsReadAction.action?contentId=NEWS1000000563 TAC for Terminal Customers: http://www.huaweidevice.com/resource/mini/201107199604/FAQ_ServiceHotline_en/index.html http://www.huaweidevice.com/worldwide/netWorkPoint.do?method=index&directory Id=40 Exploitation and Vulnerability Source This vulnerability is found by Codenomicon and Google security engineers. Contact Channel for Technique Issue For security problems about Huawei products and solutions, please contact PSIRT@huawei.com. For general problems about Huawei products and solutions, please directly contact Huawei TAC (Huawei Technical Assistance Center) to request the configuration or technical assistance. Revision History 2014-05-12 V2.7 UPDATED update the Software Versions and Fixes 2014-05-10 V2.6 UPDATED update the Software Versions and Fixes 2014-05-10 V2.5 UPDATED update the Software Versions and Fixes 2014-05-09 V2.4 UPDATED update the Software Versions and Fixes 2014-05-09 V2.3 UPDATED update the Software Versions and Fixes 2014-05-08 V2.2 UPDATED update the Software Versions and Fixes 2014-05-07 V2.1 UPDATED update the Software Versions and Fixes 2014-05-06 V2.0 UPDATED update the Software Versions and Fixes 2014-05-05 V1.9 UPDATED update the Software Versions and Fixes 2014-05-04 V1.8 UPDATED update the Software Versions and Fixes 2014-04-30 V1.7 UPDATED update the Software Versions and Fixes 2014-04-28 V1.6 UPDATED update the Software Versions and Fixes 2014-04-24 V1.5 UPDATED update the Software Versions and Fixes 2014-04-22 V1.4 UPDATED update the Software Versions and Fixes 2014-04-21 V1.3 UPDATED update the Software Versions and Fixes 2014-04-21 V1.2 UPDATED update the Software Versions and Fixes 2014-04-18 V1.1 UPDATED update the Software Versions and Fixes 2014-04-17 V1.0 INITIAL Declaration This document is provided on an "AS IS" basis and does not imply any kind of guarantee or warranty, either express or implied, including the warranties of merchantability or fitness for a particular purpose. In no event shall Huawei. or any of its directly or indirectly controlled subsidiaries or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. Your use of the document, by whatsoever means, will be totally at your own risk. Huawei is entitled to amend or update this document from time to time. Huawei Security Procedures Complete information on providing feedback on security vulnerability of Huawei products, getting support for Huawei security incident response services, and obtaining Huawei security vulnerability information, is available on Huawei's worldwide website at http://www.huawei.com/en/security/psirt/. News End