copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
Search this site

On this site

 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login


ESB-2014.1256 - [Appliance] Huawei E355: Cross-site scripting - Remote with user interaction

Date: 29 July 2014

Click here for printable version
Click here for PGP verifiable version
Hash: SHA1

             AUSCERT External Security Bulletin Redistribution

     Huawei E355 contains a stored cross-site scripting vulnerability
                               29 July 2014


        AusCERT Security Bulletin Summary

Product:           Huawei E355
Publisher:         US-CERT
Operating System:  Network Appliance
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Mitigation
CVE Names:         CVE-2014-2968  

Original Bulletin:

Comment: There currently is no update resolving this issue. US-CERT advises
         that users disable scripting in their Web Browser to mitigate the 

- --------------------------BEGIN INCLUDED TEXT--------------------

Vulnerability Note VU#688812

Huawei E355 contains a stored cross-site scripting vulnerability

Original Release date: 21 Jul 2014 | Last revised: 21 Jul 2014


The Huawei E355 built-in web interface contains a stored cross-site scripting


Huawei E355 wireless broadband modems include a web interface for 
administration and additional services. The web interface allows users to 
receive SMS messages using the connected cellular network.

CWE-79: Improper Neutralization of Input During Web Page Generation 
('Cross-site Scripting')

The web interface is vulnerable to a stored cross-site scripting 
vulnerability. The vulnerability can be exploited if a victim views SMS 
messages that contain Javascript using the web interface.

The following device configuration was reported to be vulnerable. Other 
versions may be affected:

Hardware version: CH1E355SM

Software version:

Web UI version:


A malicious attacker may be able to execute arbitrary script in the context of
the victim's browser.


We are currently unaware of a practical solution to this problem. In the 
meantime, please consider the following workaround:

Disable scripting

Disable scripting in your web browser, as specified in the Securing Your Web 
Browser document.

Vendor Information (Learn More)

Vendor 		Status 		Date Notified 	Date Updated

Huawei Technologies Affected 	06 May 2014 	01 Jul 2014

If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector

Base 6.4 AV:N/AC:L/Au:N/C:P/I:P/A:N

Temporal 5.5 E:POC/RL:W/RC:C

Environmental 1.5 CDP:L/TD:L/CR:ND/IR:ND/AR:ND



Thanks to Jimson James for reporting this vulnerability.

This document was written by Todd Lewellen.

Other Information

CVE IDs: CVE-2014-2968 
Date Public: 21 Jul 2014 
Date First Published: 21 Jul 2014 
Date Last Updated: 21 Jul 2014 
Document Revision: 10


If you have feedback, comments, or additional information about this 
vulnerability, please send us email.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email:
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.