H3C SSL VPN contains a user enumeration vulnerability that allows attackers to identify valid usernames through the 'txtUsrName' POST parameter. Attackers can submit different usernames to the login_submit.cgi endpoint and analyze response messages to distinguish between existing and non-existing accounts.

Project Subscriptions

Vendors Products
Ssl Vpn Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared H3c
H3c ssl Vpn
Vendors & Products H3c
H3c ssl Vpn

Fri, 02 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 30 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
Description H3C SSL VPN contains a user enumeration vulnerability that allows attackers to identify valid usernames through the 'txtUsrName' POST parameter. Attackers can submit different usernames to the login_submit.cgi endpoint and analyze response messages to distinguish between existing and non-existing accounts.
Title H3C SSL VPN n/a Username Enumeration via Login Script Credential Verification
Weaknesses CWE-203
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-02T19:51:05.508Z

Reserved: 2025-12-27T13:53:29.754Z

Link: CVE-2022-50800

cve-icon Vulnrichment

Updated: 2026-01-02T19:50:56.083Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-30T23:15:47.273

Modified: 2025-12-31T20:42:43.210

Link: CVE-2022-50800

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-05T10:19:34Z

Weaknesses