The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.

Project Subscriptions

Vendors Products
Ar 19\/29\/49 Subscribe
E200 Usg2200 Subscribe
E200 Usg5100 Subscribe
E200e-b Subscribe
E200e-c Subscribe
E200e-usg2100 Subscribe
E200e-x1 Subscribe
E200e-x2 Subscribe
Eudemon1000 Subscribe
Eudemon1000e-u Subscribe
Eudemon1000e-x Subscribe
Eudemon100e Subscribe
Eudemon200 Subscribe
Eudemon300 Subscribe
Eudemon500 Subscribe
Eudemon8000e-x Subscribe
Eudemon 8080e Subscribe
Eudemon 8160e Subscribe
Eudemon Usg5300 Subscribe
Eudemon Usg5500 Subscribe
Eudemon Usg9300 Subscribe
Eudemon Usg9500 Subscribe
H3c Ar\(oem In\) Subscribe
Ma5200g Subscribe
Ne20e-x6 Subscribe
Ne40e\/80e Subscribe
Ne5000e Subscribe
Nip1000 Subscribe
Nip2100 Subscribe
Nip2200 Subscribe
Nip5100 Subscribe
S3300hi Subscribe
S5300hi Subscribe
Svn2000 Subscribe
Svn3000 Subscribe
Svn5000 Subscribe
Svn5300 Subscribe
Wlan Ac 6605 Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2012-4885 The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-06T20:50:18.270Z

Reserved: 2012-09-17T00:00:00

Link: CVE-2012-4960

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-06-20T15:55:00.897

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-4960

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses