Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-37395: The input verification in CV81-WDM FW

0
High
VulnerabilityCVE-2022-37395cvecve-2022-37395
Published: Tue Sep 20 2022 (09/20/2022, 19:46:56 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: CV81-WDM FW

Description

A Huawei device has an input verification vulnerability. Successful exploitation of this vulnerability may lead to DoS attacks.Affected product versions include:CV81-WDM FW versions 01.70.49.29.46.

AI-Powered Analysis

AILast updated: 07/07/2025, 07:56:46 UTC

Technical Analysis

CVE-2022-37395 is a high-severity vulnerability identified in the input verification mechanism of the CV81-WDM firmware (FW) version 01.70.49.29.46, a Huawei device component. The vulnerability stems from improper input validation (classified under CWE-20), which can be exploited remotely without authentication or user interaction. The flaw allows an attacker to send specially crafted input to the device, causing it to malfunction and leading to a Denial of Service (DoS) condition. This DoS impact affects the availability of the device, potentially disrupting network management or operations relying on the CV81-WDM FW. The CVSS v3.1 base score of 7.5 reflects the vulnerability's high impact on availability, with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), making exploitation relatively straightforward if the device is exposed. No known exploits are currently reported in the wild, and no official patches or mitigations have been linked to this CVE at the time of publication. The vulnerability was publicly disclosed on September 20, 2022, and is assigned by Huawei. The CV81-WDM FW is typically used in network management or telecommunications infrastructure, where stability and uptime are critical. The lack of input verification suggests that malformed or unexpected data packets can crash or destabilize the firmware, leading to service interruptions.

Potential Impact

For European organizations, especially those in telecommunications, critical infrastructure, or enterprises relying on Huawei network management devices, this vulnerability poses a significant risk to service availability. A successful DoS attack could disrupt network operations, causing outages or degraded performance that affect business continuity and service delivery. Given the network-based attack vector and no requirement for authentication, attackers could exploit this vulnerability remotely if the affected devices are accessible from untrusted networks. This risk is heightened in environments where Huawei CV81-WDM FW devices are deployed at the network edge or in management roles without adequate segmentation or firewall protections. Disruptions could impact sectors such as telecommunications providers, data centers, and large enterprises, potentially leading to financial losses, reputational damage, and regulatory scrutiny under European data protection and operational resilience frameworks. Although no known exploits exist yet, the vulnerability's characteristics make it a candidate for future exploitation, especially in targeted attacks against critical infrastructure.

Mitigation Recommendations

European organizations should first identify any Huawei CV81-WDM FW devices running version 01.70.49.29.46 within their networks. Since no official patches are currently linked to this CVE, organizations should implement compensating controls immediately. These include network segmentation to isolate affected devices from untrusted or public networks, strict firewall rules to limit access to management interfaces, and monitoring for unusual traffic patterns targeting these devices. Employing intrusion detection or prevention systems (IDS/IPS) with custom signatures to detect malformed input attempts may help mitigate exploitation attempts. Organizations should engage with Huawei support channels to obtain any available firmware updates or advisories. Additionally, conducting regular vulnerability assessments and penetration testing focused on network management infrastructure can help identify exposure. Planning for incident response scenarios involving DoS conditions on critical network devices is also recommended to minimize operational impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
huawei
Date Reserved
2022-08-03T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68373654182aa0cae2538128

Added to database: 5/28/2025, 4:14:12 PM

Last enriched: 7/7/2025, 7:56:46 AM

Last updated: 2/7/2026, 1:16:25 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats