No analysis available yet.
Vendor Solution
Upgrade the NGWF device to version 5.5R8P23 or higher.
Vendor Workaround
If an upgrade is not feasible in the short term, we advise mitigating the risk by configuring a "Trusted Host Access" policy.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7556 | Generation of Error Message Containing Sensitive Information vulnerability in Hillstone Networks Hillstone Next Generation FireWall.This issue affects Hillstone Next Generation FireWall: from 5.5R8P1 before 5.5R8P23. |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 12 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Mar 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Generation of Error Message Containing Sensitive Information vulnerability in Hillstone Networks Hillstone Next Generation FireWall.This issue affects Hillstone Next Generation FireWall: from 5.5R8P1 before 5.5R8P23. | |
| Title | Absolute Path Disclosure Vulnerability in Hillstone Next Generation FireWall | |
| Weaknesses | CWE-209 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: Hillstone
Published:
Updated: 2025-03-12T14:18:30.762Z
Reserved: 2025-03-12T02:07:06.724Z
Link: CVE-2025-2239
Updated: 2025-03-12T14:18:23.844Z
Status : Deferred
Published: 2025-03-12T10:15:19.940
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-2239
No data.
OpenCVE Enrichment
No data.
EUVD