H3C Magic B1 Buffer Overflow

HIGH (8.8)

Threat Intelligence

Low Risk
EPSS Score: 0.04% chance of exploitation (percentile: 13%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

H3C Magic B1 is a network management system used by some organizations for device monitoring and configuration. This vulnerability allows attackers to execute arbitrary code on the affected H3C Magic B1 instance by manipulating specific input parameters, leading to a buffer overflow. The exploit can be triggered remotely without requiring any user interaction or authentication.

Am I affected?

You're affected if you use A weakness. Affected versions: 100 If you don't recognise this software, you're probably not affected.

Affected Packages

go: h3c.com:MagicB1

How to fix

To fix this vulnerability, upgrade to H3C Magic B1 version 100R005 or later. You can download the latest patch from the H3C website: https://www.h3c.com/en/products/Magic-B1/Patch-Release-Notes. If an immediate upgrade isn't possible, restrict network access to your H3C Magic B1 instance (firewall it from the public internet) and monitor for suspicious activity.