Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
H3c
H3c ssl Vpn |
|
| Vendors & Products |
H3c
H3c ssl Vpn |
Fri, 02 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | H3C SSL VPN contains a user enumeration vulnerability that allows attackers to identify valid usernames through the 'txtUsrName' POST parameter. Attackers can submit different usernames to the login_submit.cgi endpoint and analyze response messages to distinguish between existing and non-existing accounts. | |
| Title | H3C SSL VPN n/a Username Enumeration via Login Script Credential Verification | |
| Weaknesses | CWE-203 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-02T19:51:05.508Z
Reserved: 2025-12-27T13:53:29.754Z
Link: CVE-2022-50800
Updated: 2026-01-02T19:50:56.083Z
Status : Deferred
Published: 2025-12-30T23:15:47.273
Modified: 2026-04-15T00:35:42.020
Link: CVE-2022-50800
No data.
OpenCVE Enrichment
Updated: 2026-01-05T10:19:34Z