{"containers":{"cna":{"affected":[{"product":"ManageOne","vendor":"n/a","versions":[{"status":"affected","version":"6.5.0"},{"status":"affected","version":"6.5.0.SPC100.B210"},{"status":"affected","version":"6.5.1.1.B010"},{"status":"affected","version":"6.5.1.1.B020"},{"status":"affected","version":"6.5.1.1.B030"},{"status":"affected","version":"6.5.1.1.B040"},{"status":"affected","version":"6.5.1.SPC100.B050"},{"status":"affected","version":"6.5.1.SPC101.B010"},{"status":"affected","version":"6.5.1.SPC101.B040"},{"status":"affected","version":"6.5.1.SPC200"},{"status":"affected","version":"6.5.1.SPC200.B010"},{"status":"affected","version":"6.5.1.SPC200.B030"},{"status":"affected","version":"6.5.1.SPC200.B040"},{"status":"affected","version":"6.5.1.SPC200.B050"},{"status":"affected","version":"6.5.1.SPC200.B060"},{"status":"affected","version":"6.5.1.SPC200.B070"},{"status":"affected","version":"6.5.1RC1.B060"},{"status":"affected","version":"6.5.1RC2.B020"},{"status":"affected","version":"6.5.1RC2.B030"},{"status":"affected","version":"6.5.1RC2.B040"},{"status":"affected","version":"6.5.1RC2.B050"},{"status":"affected","version":"6.5.1RC2.B060"},{"status":"affected","version":"6.5.1RC2.B070"},{"status":"affected","version":"6.5.1RC2.B080"},{"status":"affected","version":"6.5.1RC2.B090"},{"status":"affected","version":"6.5.RC2.B050"},{"status":"affected","version":"8.0.0"},{"status":"affected","version":"8.0.0-LCND81"},{"status":"affected","version":"8.0.0.SPC100"},{"status":"affected","version":"8.0.1"},{"status":"affected","version":"8.0.RC2"},{"status":"affected","version":"8.0.RC3"},{"status":"affected","version":"8.0.RC3.B041"},{"status":"affected","version":"8.0.RC3.SPC100"}]},{"product":"NFV_FusionSphere","vendor":"n/a","versions":[{"status":"affected","version":"6.5.1.SPC23"},{"status":"affected","version":"8.0.0.SPC12"}]},{"product":"SMC2.0","vendor":"n/a","versions":[{"status":"affected","version":"V600R019C00"},{"status":"affected","version":"V600R019C10"}]},{"product":"iMaster MAE-M","vendor":"n/a","versions":[{"status":"affected","version":"MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220"}]}],"descriptions":[{"lang":"en","value":"There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220."}],"problemTypes":[{"descriptions":[{"description":"Local Privilege Escalation","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2021-02-06T01:53:36.000Z","orgId":"25ac1063-e409-4190-8079-24548c77ea2e","shortName":"huawei"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@huawei.com","ID":"CVE-2021-22299","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"ManageOne","version":{"version_data":[{"version_value":"6.5.0"},{"version_value":"6.5.0.SPC100.B210"},{"version_value":"6.5.1.1.B010"},{"version_value":"6.5.1.1.B020"},{"version_value":"6.5.1.1.B030"},{"version_value":"6.5.1.1.B040"},{"version_value":"6.5.1.SPC100.B050"},{"version_value":"6.5.1.SPC101.B010"},{"version_value":"6.5.1.SPC101.B040"},{"version_value":"6.5.1.SPC200"},{"version_value":"6.5.1.SPC200.B010"},{"version_value":"6.5.1.SPC200.B030"},{"version_value":"6.5.1.SPC200.B040"},{"version_value":"6.5.1.SPC200.B050"},{"version_value":"6.5.1.SPC200.B060"},{"version_value":"6.5.1.SPC200.B070"},{"version_value":"6.5.1RC1.B060"},{"version_value":"6.5.1RC2.B020"},{"version_value":"6.5.1RC2.B030"},{"version_value":"6.5.1RC2.B040"},{"version_value":"6.5.1RC2.B050"},{"version_value":"6.5.1RC2.B060"},{"version_value":"6.5.1RC2.B070"},{"version_value":"6.5.1RC2.B080"},{"version_value":"6.5.1RC2.B090"},{"version_value":"6.5.RC2.B050"},{"version_value":"8.0.0"},{"version_value":"8.0.0-LCND81"},{"version_value":"8.0.0.SPC100"},{"version_value":"8.0.1"},{"version_value":"8.0.RC2"},{"version_value":"8.0.RC3"},{"version_value":"8.0.RC3.B041"},{"version_value":"8.0.RC3.SPC100"}]}},{"product_name":"NFV_FusionSphere","version":{"version_data":[{"version_value":"6.5.1.SPC23"},{"version_value":"8.0.0.SPC12"}]}},{"product_name":"SMC2.0","version":{"version_data":[{"version_value":"V600R019C00"},{"version_value":"V600R019C10"}]}},{"product_name":"iMaster MAE-M","version":{"version_data":[{"version_value":"MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Local Privilege Escalation"}]}]},"references":{"reference_data":[{"name":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en","refsource":"CONFIRM","url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T18:37:18.487Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en"}]}]},"cveMetadata":{"assignerOrgId":"25ac1063-e409-4190-8079-24548c77ea2e","assignerShortName":"huawei","cveId":"CVE-2021-22299","datePublished":"2021-02-06T01:53:36.000Z","dateReserved":"2021-01-05T00:00:00.000Z","dateUpdated":"2024-08-03T18:37:18.487Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}