Vulnerability Note VU#688812

Huawei E355 contains a stored cross-site scripting vulnerability

Original Release date: 21 Jul 2014 | Last revised: 21 Jul 2014

Overview

The Huawei E355 built-in web interface contains a stored cross-site scripting vulnerability.

Description

Huawei E355 wireless broadband modems include a web interface for administration and additional services. The web interface allows users to receive SMS messages using the connected cellular network.

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The web interface is vulnerable to a stored cross-site scripting vulnerability. The vulnerability can be exploited if a victim views SMS messages that contain Javascript using the web interface.

The following device configuration was reported to be vulnerable. Other versions may be affected:
Hardware version: CH1E355SM
Software version: 21.157.37.01.910
Web UI version: 11.001.08.00.03

Impact

A malicious attacker may be able to execute arbitrary script in the context of the victim's browser.

Solution

We are currently unaware of a practical solution to this problem. In the meantime, please consider the following workaround:

Disable scripting

Disable scripting in your web browser, as specified in the Securing Your Web Browser document.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Huawei TechnologiesAffected06 May 201401 Jul 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 6.4 AV:N/AC:L/Au:N/C:P/I:P/A:N
Temporal 5.5 E:POC/RL:W/RC:C
Environmental 1.5 CDP:L/TD:L/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Jimson James for reporting this vulnerability.

This document was written by Todd Lewellen.

Other Information

  • CVE IDs: CVE-2014-2968
  • Date Public: 21 Jul 2014
  • Date First Published: 21 Jul 2014
  • Date Last Updated: 21 Jul 2014
  • Document Revision: 10

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.